_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000480)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d0020000800100009800000080010000000000000000000038020000380200003802000038020000380200000400000000000000000000007f000001ac14140000000000000000007f00000000000000000000000000000064756dea20f9524db2d96900000057c910a19f2bc02c00000000000000000000200000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000f9c9991d0000000000000000000000000000005000736574000000000000000000000000000000000000000000000000000003000005050000000000000000000000000000000000000000100000000000000000000000000000000000000000000000280052454a45435400000000000000010000000000000000000000000000000000674f000000000000000000e00000020000000000000000766574b5315f766c616e00000000010062726964676530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b80000000000000000000000000000000000000000004800544545000000000000000000000000000000d40200000000000000000001ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000742b00e00000000000000000001a51496c00000000feffffff"], 0x1) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 16:32:49 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:32:49 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:32:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 631.352381] ip6_vti0: Invalid MTU 870 requested, hw min 1280 [ 631.379949] Cannot find set identified by id 0 to match 16:32:49 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="00400000001200000000003a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xa2b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) [ 631.403630] Cannot find set identified by id 0 to match 16:32:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:32:52 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:32:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='cgroup\x00') sendfile(r0, r1, &(0x7f0000000100), 0xe0) 16:32:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:32:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:32:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:32:52 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:32:52 executing program 0: msgget$private(0x0, 0x0) syz_open_procfs(0x0, 0x0) 16:32:52 executing program 0: syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b40)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000ff0000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000006b26333d00000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffffba4c217257a7f2730000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') sendfile(r1, r2, 0x0, 0x7f) r3 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') sendfile(r3, r4, 0x0, 0x7f) 16:32:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x5e, &(0x7f0000000d40)={@random="897acf95550b", @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @mcast1, @rand_addr="6060581062b3af1ae3effe58f854a1a6"}}}}}}, 0x0) 16:32:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 634.418067] ip6_vti0: Invalid MTU 873 requested, hw min 1280 [ 634.428977] ip6_tables: ip6tables: counters copy to user failed while replacing table [ 634.448965] ip6_tables: ip6tables: counters copy to user failed while replacing table 16:32:52 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000001080)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x8, 0x3a, 0x0, @rand_addr="5306b3c59dc3dfdcfa1d4e48dd53fb94", @mcast2, {[], @echo_request}}}}}, 0x0) 16:32:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:32:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:32:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:32:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa857453b9e7e186dd60aa413b00140600fe8000000000000000000000000000bb00000000000000000000ffff0000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500001009080de0026e5262a12b801c2f229b5947926ba01a20e25ae378374901973614ddaeb0b43220b93d9ffef92f77c05855bab178a821238ba2fdbf444bc0e77afe8ce17037a1e13c067738fdb83937ba8c67fc253cb56c88e5c3df18971c82d268865dea610a3b54f1aeedd8d0fca5e8075807714f1212cb5e8f5967084303ed05489b599e306cdd5777d703ccdf2a809eb91"], 0x0) 16:32:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:32:55 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:32:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="6653070002053c27bc337600363940082378df5cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8736460234432479aed75d492b415bcee0f0fc00008e99c5af81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 637.422620] ip6_vti0: Invalid MTU 876 requested, hw min 1280 16:32:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:32:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:32:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 637.657408] ip6_vti0: Invalid MTU 878 requested, hw min 1280 16:32:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:32:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:32:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66", 0x9}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 637.902295] ip6_vti0: Invalid MTU 880 requested, hw min 1280 16:32:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:32:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:32:58 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:32:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66", 0x9}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:32:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc567600", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:32:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) 16:32:58 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 640.435893] Cannot find add_set index 0 as target 16:32:58 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:32:58 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:32:58 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 640.487649] ip6_vti0: Invalid MTU 882 requested, hw min 1280 [ 640.495071] Cannot find add_set index 0 as target 16:32:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66", 0x9}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:32:58 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002", 0xd}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc567600", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 643.555032] ip6_vti0: Invalid MTU 885 requested, hw min 1280 16:33:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002", 0xd}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:04 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002", 0xd}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc567600", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:04 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:04 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 646.613521] ip6_vti0: Invalid MTU 888 requested, hw min 1280 16:33:05 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401", 0xf}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401", 0xf}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 649.643038] ip6_vti0: Invalid MTU 891 requested, hw min 1280 16:33:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401", 0xf}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:08 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:10 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100", 0x10}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:10 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 652.566474] ip6_vti0: Invalid MTU 895 requested, hw min 1280 16:33:10 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100", 0x10}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 652.862084] ip6_vti0: Invalid MTU 897 requested, hw min 1280 16:33:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:13 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:13 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100", 0x10}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 655.721244] ip6_vti0: Invalid MTU 900 requested, hw min 1280 16:33:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x0, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 656.039975] ip6_vti0: Invalid MTU 903 requested, hw min 1280 16:33:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x0, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:16 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:17 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:17 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x0, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 658.856898] ip6_vti0: Invalid MTU 905 requested, hw min 1280 16:33:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:17 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:19 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:33:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:19 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:20 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) 16:33:20 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) 16:33:20 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='T\xf2', 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) 16:33:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 661.816303] ip6_vti0: Invalid MTU 910 requested, hw min 1280 16:33:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 16:33:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:23 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 16:33:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:23 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1) [ 664.791008] Cannot find add_set index 0 as target 16:33:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 16:33:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 664.865118] ip6_vti0: Invalid MTU 913 requested, hw min 1280 16:33:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000001680)=[{{&(0x7f0000000140)=@sco, 0x0, &(0x7f0000000280)=[{&(0x7f0000000400)="9da3d5a3d38ae36942235a3bbc8d10d2d70034a1d58a700ebf9da8f333590abcafc40917b768efcaecc91adf63f9c5f74ae7648ed51456cca953fac1581c18efdf25251e955bd9dbc7cc3459128b4dc0bf54e5ca8a23194dff757f3c262497fac5b14520bd72fe11afada8dbbdc29bce1a66501f917a8c8929f438ad4f38caadc3b341df02a555b129a58c3fcfb40704a8b0ba0e42c71f5b988e69a7e77b9513a5046dcff8bf408505b58f1100b94671214926af58d7b0a266472b16a892212f4b5dada3b158712dc196e88701d39dc6248364a4a177af8fdb7725c8d2aa6992843174ed1f2cc44ac44ae44eded667dc0d275f5d80"}, {&(0x7f0000000500)="e477961b00a60b16cd38f5124f9ed56acd282ea74c95dc6bd100b874a3fd19ce6c42cfc05014a98bd3a7b71e4b6977fcacf27d62fcc5cfed42109e59003d64d2ea1c2de902065540fa798f8baae64925c212124257d76993ef7a492f152a61773f36eaab2e8aa0ee6401e0bef36769decb6b079a17cdd172db66442d36bb11456c52878bdbdae11a7ab477ad368e8689b48f51c8a157c2694d48bbbb8253819d2377b08fb0f30191f199ae04a161041f8d0e0ee8653c8c4d4b7bc19393d9ac16c7ffb860c9f421292a813dbd6aa93dfb12b549cfc5607d501d3ac04a9a7eb32c40071dc2a20704c12804f8cc699a3b486f"}, {&(0x7f00000001c0)}, {&(0x7f0000000600)="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"}], 0x0, &(0x7f0000001600)=[{0x0, 0x0, 0x0, "0021554cada8d75547dea59193d53304f44bf8f3e83ddfe7ecfda97565f00e6d62"}, {0x0, 0x0, 0x0, "dff99a92319bf5c2dcc342950a0f5dbf0e830c529d7bc1cf957792142fb5480c1ad8097358cc7b591b7c6404a35db96fb6"}]}}], 0x4000270, 0x50) 16:33:23 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:23 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:26 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:26 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000880), 0x4000224, 0x0) 16:33:26 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000880), 0x4000224, 0x0) 16:33:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:26 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000880), 0x4000224, 0x0) 16:33:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:26 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:29 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r1, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:29 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:29 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 671.145845] ip6_vti0: Invalid MTU 922 requested, hw min 1280 16:33:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r1, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:32 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r1, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 674.045786] ip6_vti0: Invalid MTU 924 requested, hw min 1280 16:33:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r1, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:35 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 677.054155] ip6_vti0: Invalid MTU 927 requested, hw min 1280 16:33:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r1, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(r1, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:38 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) 16:33:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 680.132566] ip6_vti0: Invalid MTU 930 requested, hw min 1280 16:33:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 680.386009] ip6_vti0: Invalid MTU 933 requested, hw min 1280 16:33:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) fstat(r2, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:41 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) 16:33:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 683.184680] ip6_vti0: Invalid MTU 935 requested, hw min 1280 16:33:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) setgid(0x0) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, 0x0, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 683.585675] ip6_vti0: Invalid MTU 939 requested, hw min 1280 16:33:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:44 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) 16:33:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) setgid(0x0) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, 0x0, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 686.190206] ip6_vti0: Invalid MTU 941 requested, hw min 1280 16:33:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) setgid(0x0) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, 0x0, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 686.518935] ip6_vti0: Invalid MTU 944 requested, hw min 1280 16:33:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 686.766783] ip6_vti0: Invalid MTU 946 requested, hw min 1280 16:33:45 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(0x0, 0x14) 16:33:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:47 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(0x0, 0x14) 16:33:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:47 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(0x0, 0x14) 16:33:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 689.256169] ip6_vti0: Invalid MTU 948 requested, hw min 1280 16:33:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:47 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 689.565755] ip6_vti0: Invalid MTU 951 requested, hw min 1280 16:33:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:50 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 692.163976] ip6_vti0: Invalid MTU 953 requested, hw min 1280 16:33:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:50 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:50 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 692.458765] ip6_vti0: Invalid MTU 955 requested, hw min 1280 16:33:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:50 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x0, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 692.736459] ip6_vti0: Invalid MTU 957 requested, hw min 1280 16:33:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:53 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x0, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:33:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:53 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 695.492169] ip6_vti0: Invalid MTU 959 requested, hw min 1280 16:33:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x0, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 695.725215] ip6_vti0: Invalid MTU 962 requested, hw min 1280 16:33:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:56 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:56 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:33:56 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) [ 698.438731] ip6_vti0: Invalid MTU 964 requested, hw min 1280 16:33:56 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:56 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:56 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:57 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:57 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 698.739939] ip6_vti0: Invalid MTU 966 requested, hw min 1280 16:33:57 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x4000224, 0x0) 16:33:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 698.913643] ip6_vti0: Invalid MTU 968 requested, hw min 1280 16:33:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:33:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000880), 0x4000224, 0x0) 16:33:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:33:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:33:59 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:33:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000880), 0x4000224, 0x0) 16:33:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:33:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000880), 0x4000224, 0x0) 16:33:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 16:33:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) [ 701.657587] ip6_vti0: Invalid MTU 970 requested, hw min 1280 16:34:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 16:34:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc004, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 16:34:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r8, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 704.493154] ip6_vti0: Invalid MTU 972 requested, hw min 1280 16:34:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:02 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:34:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:02 executing program 0: 16:34:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 16:34:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r8, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:02 executing program 0: 16:34:02 executing program 0: 16:34:03 executing program 0: 16:34:03 executing program 0: 16:34:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 704.699410] ip6_vti0: Invalid MTU 974 requested, hw min 1280 16:34:03 executing program 0: 16:34:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:34:05 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:34:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r8, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 16:34:06 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 707.703130] ip6_vti0: Invalid MTU 976 requested, hw min 1280 16:34:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:06 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:34:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:06 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 707.937299] ip6_vti0: Invalid MTU 978 requested, hw min 1280 16:34:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:08 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={&(0x7f0000000300)="ccf0857d9e856cfe51c07440f77b121b2fb9125be07b0db0ade05ae35e09d8ad7fe950adc0f45b2b6ac40de17e3cb347868fa07555f71c5ecabaff63b4a2ea863d43eb5cd6d7303c2f8f184e7d151a08b405f26c22b5fa8dad1b88567c971808749287dcb4ad0ffdba48cbd609b2a696e738d90100f1f2da12dd17385f2680e2547779b0702992bbe7054cfd3dcb06c792a54b534fc4cad9dbee", &(0x7f0000000480)=""/175, &(0x7f0000000540), 0x0, 0x0, r2}, 0x38) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, &(0x7f0000005500)) r3 = socket$inet6(0xa, 0x80003, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a0, 0x0, 0x50, 0xd8, 0xd8, 0x0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff}}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x300) 16:34:08 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:34:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7fffffff}]}) 16:34:08 executing program 0: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0420eb00000000000001ff75192e7f0008000000b4f1a0930136028520a54a95a0a13f4ada47f101d4a9e0a1e40656b37c0d183212629269c8c45420de69b152e25d2d06"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r2) [ 710.675937] Cannot find del_set index 0 as target 16:34:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5}]}, 0x1c}}, 0x0) 16:34:09 executing program 0: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, r1, 0xe9b038d1c8b8214d}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r4, 0x4008af14, &(0x7f00000003c0)={0x1, 0x100}) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x38, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr="d71a74545bf8f30700acba3ed2a63310"}, @FOU_ATTR_PEER_PORT={0x6}]}, 0x38}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$cgroup_ro(r8, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r9, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r10, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x653}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000810}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001940)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1841}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @dev}, @IFLA_GRE_IFLAGS={0x6, 0x2, 0x7}, @IFLA_GRE_IGNORE_DF={0x5}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x58}}, 0x0) [ 710.742621] ip6_vti0: Invalid MTU 980 requested, hw min 1280 [ 710.762997] PKCS7: Unknown OID: [5] (bad) [ 710.775105] PKCS7: Only support pkcs7_signedData type 16:34:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) 16:34:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r7 = socket$inet6(0xa, 0x3, 0x5) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 710.865008] audit: type=1326 audit(1583944449.148:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21050 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f50a code=0x0 [ 710.972510] ip6_vti0: Invalid MTU 982 requested, hw min 1280 [ 711.665628] audit: type=1326 audit(1583944449.948:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21050 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f50a code=0x0 16:34:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:12 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:34:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r7, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r8, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x2, @tid=r2}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24044809, &(0x7f0000000080)={0xa, 0x2, 0x0, @empty}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x1000000000000007, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) 16:34:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb76ea7211439a321f589f32be513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b143521435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) [ 713.843077] ip6_vti0: Invalid MTU 984 requested, hw min 1280 16:34:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0xe) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) r3 = dup(r2) sendmsg$netlink(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000004000)={0xa5c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xa4a, 0x0, 0x0, 0x1, [@typed={0x4}, @generic="0ef38e55d76e51ad2f3dcd15ca4dc9c0a23dac16e9602b36437404dda54922845b2260041abbabc35d3664fb0e7c08effac6669458a07118bde41423ccc6c09dd24a308b6e754bdce71acb90dca60ff2c8da42637503d36e7005d941de1db472d1dcf403f6a68cd44885f6c5bbbb2d74aa0d53c85bc479e21a57aadbeb6c3df3bd034fc8d70ea30b89c9ba76867ba71ba7ba0f1392383e6cdd7d178439258101ff1d9f1cd47bb0513d938370106a147a18351ce4f83dea9f4df5f6fbc98e6ad738229395528e50c1f5ea8a01c30a3c1a862d40dcbc5d9a517a7555a135897e733cc3a13f780717785e73176d576ecbc7f81f5adc7817f2019cc1b1092dc4e6dd5afa7375f1b58b97765d185c3c8454270ccdda2a98c00975be89bae5af9fe4327184a1fd2543793a440115bfa109682334a1ab6e3d1f3da3982aa4cad8433bb1493031dc5055da5a6c6c4ec26b7f567aa13dfcceaaf202b6de229618d0a9bad641f5ab9a3ee946d0411a2d0dfd218315a26fd356ccfb1bed248f871fd6b0d477cbf6993c80ebcc7881cfe281c2c92e8630e7805c7c0918e95d3ba409205c52a3f243a8288f2cebb477e0e8b3765300108823fd3666f117f3e835f212591c0476757d892dc9ffcc5ad68bf62011f00161dcd8904eb5fe30ec04acb2c634964e71ca0f868fe342f0e68bffdc652508320eb9b14355029bcebbb3f0aa411b96fe2fb3f15300fdb503abbf72ce57480026adfc037b46bf110d7c6b84847c355b8148d9e1bab73dd2746d254d2c04788cefafb0f1692c21917b1596279770b2e841bbbf400c1da705fba3b722f8d827cc70fb4b6997fb5ea451ad1719696dfd23ee646e3092d33dfc9f31f3ac386066996a5d14ee0c94fb69208a4445f7d3571fa5df380373ed1277bf7823898a959bdfa0cf3e328af1dcf104895c96f3af48826700d16072eed2c8e6ff0328cb80b02f4f1b7d35a71d2c639a5bba5122c6d12bc5d2ec7c27f4ddf3c66079defaaecd8790ae83c846e4f143e1e7b18066e28c4ee3bf642ca1685d590abab5be233942dcb2f52cda2318c822afce64a284168ba609312b58cd17d0b2ec0b4e3660bbab2f111664cfd64b3ee85451a0b56e98e6b3d75fcf9099cdd50fd30267f58648877176087519be7614d823efe27aee618df7002c725130e133380ada89ae94efdf7daf39da1a1d84359a069764692b259c0da9cbf6bedf89b0ea3cc70b3076a5f1514afa32495b2a9447715ebbae92e7004bccdbe1b5eb31d774a4658b5a0599dcbf43da80e472b10c501a58a3c85363d9d690ea006f0fdb46b74c70f6ab595e2e9ffd083ece2f1de0d47fc52299419c2a6a06901029d0e5077233dc75e75e1fe854416841bfd2f3f0f8e0ebef00fdd15fa2fe5ca51d04c7cfbdbb63b7940229acbbd513a6e5891e72764267f559c84395947fa439d402b244b3d727ae4d56fb698bb69255298e3409e8a6d4404149b9d8afa58794edfc9f4b0b422bdc97d67f88e815b43760df4ecb06fbd7af19bcbbded6e34017fba9a2b905beafefbfe0136ac005b9ddb6a7337d01f3bdca34efaf86ddad622b2e1a1a3a3946c50a33c17425c3baa6ce71059e9abe66a84c90adab01739923dcec0098fd08b496abe7b20a74effa7ccc4be10dc3538a3a8c23cbb7811d7a021a8c021ab608f3d27a9ba07a3049d2db53976b6e7f9764638a5f1956821d046b39d0a16c19800672725afaa83594c71a7e1dbdcb4f28fd78216dbbb63e8e34796cb5ade56baf7103747a9698b0ff723c8e2f0ee1b9d34718faaa434bab13bba67319d35be759764690c1da7873e4affdd9e0f22f16df0f9179d11427262f5da30e7d1d6c27d0481fb23bef1741695e2950dad1eee22df2f3ac437963cd6ca77ae0d9c83da7d5c0b096d252ff9791cb0f1a3b1471c469d4235173d56bb974f13112abce78e6690d42f42bef9adf97f41131017a59028f8ae77b78cba727fd228937683edbad6ec1ce9dd3d8341d787b0f3d9a63157021f8961199494001751c6dcdfd2d1546cd2e14e82112aa353057551c371137b4bd9f583ba6c13d87d914c89a33211b58bc5f709400050ba8cc1736b594fb35b48bdec1210442faf3016fa8d06a4f9540f38e88d3270697758168b55dde67ba35860714ccc7de706f41e972ac9d0b549805443dc3530972eaa81cf974a236b32f661e98e0d25d04e37975c026a9c6faa24abb8479d7f0fc7c67989f63e1710d6407bc3820b00c4eb93fc5044655a1a1ac9e91aa88af6c251ea27f4e5f69f73ab3ea3db50a5e16e893163505e41dee59249b908370a86e3ef76f06475aa1dfd7608c3e4e843de5c74a851e89ff2ea0c56444ba667e51f853903db15aea16b70ae1a94570e75a8eb70b01b8930ae63c1d1a2fd0e755f1adb300062ffa237430aa173a8af948d8d19888e293828337514c71fa83aa8bfc1ae6004180e339a0d1bcd9be64ac0141ac077e41f0f423b52df93e682189a9d30eb7e9ee7d3cf4b17812e9cb2e1aac9ede87b5f08383425ff81ec2295882b06c420eba411c3d0a170c8aecfd69cf9ddca98b8fee1455ca160f4f3335d991f2da7a9399aa94f4dee47515229fc2ddf2348e2e8ab1e1045510c6dcbdd60b30b2b749bd4e2b7c543454365a75f3b68b54cbfa1738da49f36732c4de942931ce77e5d789cd43140fe5d64c0438332d095484cf956e551214c4780d07a8a9acf18973542630a9ae6f63d01d83f3573867aaf8b4c5c038b79133b2535fe0a159dc433a592548d611d2cf1f570186ef53225b2a5d6627f13741a5f1ec1614247c7e253772b0307df3c583fd9054dbfbe2fe2256a442e423cbb74c787b7f2a9a8d027fda76ca7ffa502d8e87ca9e1a37ff3323f213102c065b4b3a21c7bee017df163cbf4814b80c45a0ba5497addb6281942871aac9e8ce09b7702b3364474c6dfdd0a2e75157a725c9e9c64cc3da12f7fa9535d46e950953645f2d79b508b0279504f8cb03b0f3663ee3bccafc63c5ead8f89027b8fe379e28f23fa9ce60ba3179de5d3ee4bf55d4be969de6f444b2c111a0d5e9ba0342043ab9abd0ee4ef4b8a6e144814cfc06f575f53585720e64e1cda196c20e66f6adf5c40572c9218401c016161dd368408616fa2bed074a1e57643b5922ed3c7edbf5f0bd787c9c1772c3caca6955d62d3992e285c94da3527301bc0affbd354f06f2f424c3f599966260501baa357f957eb5ce03835c28700b755c0d9281cb378e5b13cba4e5cdea1f5525d1a513165b007fc06acbdef86a1127ef0d58d1f64c8ec9d70ca008a85e0c0d914258ab0b68b2435742e70c23abf86f3e7da96693479b497e16bf8a2cfc9ca0cda4ecbe5c13454716d740638037cbd433e38080f43476a89edbda8d25bc479b443a9fe1f91b75a840feca96ccc98ace5588e8ced3d4aa9ed5a6ed1a2a1e44b4ec1b6882659837e21e2ec1f38d11d1aada70720bfddd0a4a86bc1243481a959484ea54103ae24ae14afa60e8bdd710568c112d56adb234ed49bf0981307beccf4912e2f031508dc1cc3cc2b1b0c921c6489a5fd7aae941fd0af08c72f64f44fd7410313066e4be69c311a8b74dd2fd0c5804e16a6d3727b168226363fe824c4eafb632db57dd0a5e7a6bcc2ad4210c7a808238cd054e9da671ad81e00375e9365f61bd894eea1112c667617c038a5d2f6436853cced620ffbcd2"]}]}, 0xa5c}], 0x1}, 0x4000091) connect$unix(r3, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 16:34:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:12 executing program 5: pipe(&(0x7f0000000680)) getpid() sched_setscheduler(0x0, 0x5, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, 0x0, 0x0) getpgrp(0x0) capget(&(0x7f0000000000), 0x0) getpgid(0x0) memfd_create(0x0, 0x5) ppoll(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) r3 = syz_open_dev$amidi(0x0, 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'\x00', 0x902}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000040)}}, 0x20) sendmsg$key(0xffffffffffffffff, 0x0, 0x40040) r4 = getpid() sched_setscheduler(r4, 0x5, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) waitid(0x0, r5, 0x0, 0x0, &(0x7f0000000b00)) sendmsg$key(0xffffffffffffffff, 0x0, 0x20004850) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) syz_open_dev$dmmidi(&(0x7f0000000a40)='/dev/dmmidi#\x00', 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x11, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x90, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xc, 0xa1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='bond_slave_1\x00', 0x10) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r8 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r6, r7, 0x0, 0x102000004) 16:34:12 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:34:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r7, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r8, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:12 executing program 5: pipe(&(0x7f0000000680)) getpid() sched_setscheduler(0x0, 0x5, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, 0x0, 0x0) getpgrp(0x0) capget(&(0x7f0000000000), 0x0) getpgid(0x0) memfd_create(0x0, 0x5) ppoll(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) r3 = syz_open_dev$amidi(0x0, 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'\x00', 0x902}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000040)}}, 0x20) sendmsg$key(0xffffffffffffffff, 0x0, 0x40040) r4 = getpid() sched_setscheduler(r4, 0x5, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) waitid(0x0, r5, 0x0, 0x0, &(0x7f0000000b00)) sendmsg$key(0xffffffffffffffff, 0x0, 0x20004850) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) syz_open_dev$dmmidi(&(0x7f0000000a40)='/dev/dmmidi#\x00', 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x11, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x90, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xc, 0xa1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='bond_slave_1\x00', 0x10) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r8 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r6, r7, 0x0, 0x102000004) [ 714.135827] ip6_vti0: Invalid MTU 987 requested, hw min 1280 16:34:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:15 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nvram\x00', 0x4000, 0x0) 16:34:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r7, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r8, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:15 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) 16:34:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x101) [ 716.786527] [ 716.788189] ====================================================== [ 716.794494] WARNING: possible circular locking dependency detected [ 716.800797] 4.14.172-syzkaller #0 Not tainted [ 716.805276] ------------------------------------------------------ [ 716.811578] syz-executor.0/21127 is trying to acquire lock: [ 716.817271] (&p->lock){+.+.}, at: [] seq_read+0xba/0x1160 [ 716.824543] [ 716.824543] but task is already holding lock: [ 716.830496] (sb_writers#4){.+.+}, at: [] do_sendfile+0x865/0xaf0 [ 716.838341] [ 716.838341] which lock already depends on the new lock. [ 716.838341] [ 716.846638] [ 716.846638] the existing dependency chain (in reverse order) is: [ 716.854245] [ 716.854245] -> #3 (sb_writers#4){.+.+}: [ 716.859749] __sb_start_write+0x1a1/0x2e0 [ 716.864412] mnt_want_write+0x3a/0xb0 [ 716.868850] ovl_create_object+0x75/0x1d0 [ 716.873524] lookup_open+0x10e8/0x1750 [ 716.877920] path_openat+0xfc1/0x3c50 [ 716.882223] do_filp_open+0x18e/0x250 [ 716.886521] do_sys_open+0x29d/0x3f0 [ 716.890743] do_syscall_64+0x1d5/0x640 [ 716.895225] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.901002] [ 716.901002] -> #2 (&ovl_i_mutex_dir_key[depth]){++++}: [ 716.907752] down_read+0x37/0xa0 [ 716.911625] path_openat+0x185a/0x3c50 [ 716.916025] do_filp_open+0x18e/0x250 [ 716.920331] do_open_execat+0xda/0x430 [ 716.924730] do_execveat_common.isra.0+0x694/0x1c70 [ 716.930259] SyS_execve+0x34/0x40 [ 716.934227] do_syscall_64+0x1d5/0x640 [ 716.938618] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.944318] [ 716.944318] -> #1 (&sig->cred_guard_mutex){+.+.}: [ 716.950635] __mutex_lock+0xe8/0x1470 [ 716.955031] do_io_accounting+0x1c7/0x750 [ 716.960736] proc_single_show+0xe7/0x150 [ 716.965297] seq_read+0x4d2/0x1160 [ 716.969374] do_iter_read+0x3e3/0x5a0 [ 716.973700] vfs_readv+0xd3/0x130 [ 716.977652] do_preadv+0x161/0x200 [ 716.981694] do_syscall_64+0x1d5/0x640 [ 716.986094] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.991782] [ 716.991782] -> #0 (&p->lock){+.+.}: [ 716.996949] lock_acquire+0x170/0x3f0 [ 717.001261] __mutex_lock+0xe8/0x1470 [ 717.005570] seq_read+0xba/0x1160 [ 717.009525] proc_reg_read+0xf2/0x160 [ 717.013827] do_iter_read+0x3e3/0x5a0 [ 717.018143] vfs_readv+0xd3/0x130 [ 717.022101] default_file_splice_read+0x41d/0x870 [ 717.027443] do_splice_to+0xfb/0x150 [ 717.031654] splice_direct_to_actor+0x20a/0x730 [ 717.036825] do_splice_direct+0x164/0x210 [ 717.041471] do_sendfile+0x469/0xaf0 [ 717.045689] SyS_sendfile64+0xff/0x110 [ 717.050095] do_syscall_64+0x1d5/0x640 [ 717.054483] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 717.060168] [ 717.060168] other info that might help us debug this: [ 717.060168] [ 717.068290] Chain exists of: [ 717.068290] &p->lock --> &ovl_i_mutex_dir_key[depth] --> sb_writers#4 [ 717.068290] [ 717.080348] Possible unsafe locking scenario: [ 717.080348] [ 717.086391] CPU0 CPU1 [ 717.091037] ---- ---- [ 717.095683] lock(sb_writers#4); [ 717.099115] lock(&ovl_i_mutex_dir_key[depth]); [ 717.106368] lock(sb_writers#4); [ 717.112315] lock(&p->lock); [ 717.115398] [ 717.115398] *** DEADLOCK *** [ 717.115398] [ 717.121434] 1 lock held by syz-executor.0/21127: [ 717.126173] #0: (sb_writers#4){.+.+}, at: [] do_sendfile+0x865/0xaf0 [ 717.134390] [ 717.134390] stack backtrace: [ 717.138872] CPU: 0 PID: 21127 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0 [ 717.146727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.156111] Call Trace: [ 717.158736] dump_stack+0x13e/0x194 [ 717.162347] print_circular_bug.isra.0.cold+0x1c4/0x282 [ 717.167690] __lock_acquire+0x2cb3/0x4620 [ 717.171814] ? __lock_acquire+0x5f7/0x4620 [ 717.176028] ? trace_hardirqs_on+0x10/0x10 [ 717.180251] ? trace_hardirqs_on+0x10/0x10 [ 717.184480] ? trace_hardirqs_on+0x10/0x10 [ 717.188710] ? save_trace+0x290/0x290 [ 717.192500] lock_acquire+0x170/0x3f0 [ 717.196292] ? seq_read+0xba/0x1160 [ 717.199897] ? seq_read+0xba/0x1160 [ 717.203502] __mutex_lock+0xe8/0x1470 [ 717.207299] ? seq_read+0xba/0x1160 [ 717.210903] ? mark_held_locks+0xa6/0xf0 [ 717.214940] ? retint_kernel+0x2d/0x2d [ 717.218814] ? seq_read+0xba/0x1160 [ 717.222419] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 717.227423] ? mutex_trylock+0x1a0/0x1a0 [ 717.231509] ? check_preemption_disabled+0x35/0x240 [ 717.236500] ? retint_kernel+0x2d/0x2d [ 717.240369] ? save_trace+0x290/0x290 [ 717.244149] ? seq_read+0xba/0x1160 [ 717.247751] seq_read+0xba/0x1160 [ 717.251215] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 717.257865] ? seq_lseek+0x3d0/0x3d0 [ 717.261577] ? avc_policy_seqno+0x5/0x10 [ 717.265618] ? selinux_file_permission+0x7a/0x440 [ 717.270449] ? seq_lseek+0x3d0/0x3d0 [ 717.274145] proc_reg_read+0xf2/0x160 [ 717.277925] do_iter_read+0x3e3/0x5a0 [ 717.281706] vfs_readv+0xd3/0x130 [ 717.285139] ? compat_rw_copy_check_uvector+0x320/0x320 [ 717.290504] ? alloc_pages_current+0xef/0x1e0 [ 717.294981] ? iov_iter_get_pages_alloc+0x2b7/0xe90 [ 717.299973] ? iov_iter_revert+0x980/0x980 [ 717.304188] ? iov_iter_pipe+0x93/0x2b0 [ 717.308142] default_file_splice_read+0x41d/0x870 [ 717.312987] ? save_stack+0x32/0xa0 [ 717.316590] ? kasan_kmalloc+0xbf/0xe0 [ 717.320454] ? __kmalloc+0x15b/0x7c0 [ 717.324147] ? alloc_pipe_info+0x156/0x380 [ 717.328360] ? page_cache_pipe_buf_release+0x210/0x210 [ 717.333619] ? trace_hardirqs_on+0x10/0x10 [ 717.337830] ? preempt_schedule_common+0x4a/0xc0 [ 717.342565] ? fsnotify+0x897/0x1110 [ 717.346260] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 717.352908] ? fsnotify+0x1110/0x1110 [ 717.356686] ? __inode_security_revalidate+0xcf/0x120 [ 717.361856] ? avc_policy_seqno+0x5/0x10 [ 717.365895] ? selinux_file_permission+0x7a/0x440 [ 717.370762] ? security_file_permission+0x82/0x1e0 [ 717.375680] ? rw_verify_area+0xe1/0x2a0 [ 717.379740] ? page_cache_pipe_buf_release+0x210/0x210 [ 717.385010] do_splice_to+0xfb/0x150 [ 717.388708] ? alloc_pipe_info+0x2dc/0x380 [ 717.392935] splice_direct_to_actor+0x20a/0x730 [ 717.397601] ? generic_pipe_buf_nosteal+0x10/0x10 [ 717.402427] ? do_splice_to+0x150/0x150 [ 717.406384] ? rw_verify_area+0xe1/0x2a0 [ 717.410437] do_splice_direct+0x164/0x210 [ 717.414568] ? splice_direct_to_actor+0x730/0x730 [ 717.419446] ? rcu_read_lock_sched_held+0x10a/0x130 [ 717.424444] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 717.429182] do_sendfile+0x469/0xaf0 [ 717.432891] ? do_compat_pwritev64+0x140/0x140 [ 717.437496] ? put_timespec64+0xaa/0xf0 [ 717.441449] SyS_sendfile64+0xff/0x110 [ 717.445322] ? SyS_sendfile+0x130/0x130 [ 717.449273] ? fput+0xb/0x140 [ 717.452358] ? do_syscall_64+0x4c/0x640 [ 717.456310] ? SyS_sendfile+0x130/0x130 [ 717.460263] do_syscall_64+0x1d5/0x640 [ 717.464132] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 717.469302] RIP: 0033:0x45c6c9 [ 717.472472] RSP: 002b:00007f720c6eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 717.480159] RAX: ffffffffffffffda RBX: 00007f720c6eb6d4 RCX: 000000000045c6c9 16:34:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 16:34:15 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r11, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r11, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r12 = gettid() recvfrom$inet(r11, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r12, 0x14) [ 717.487418] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 717.494674] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 717.501929] R10: 0000000000000101 R11: 0000000000000246 R12: 00000000ffffffff [ 717.509179] R13: 00000000000008d1 R14: 00000000004cb5d0 R15: 000000000076bf2c 16:34:15 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) ftruncate(r0, 0x0) 16:34:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffffffffffeb4}], 0xb3e, 0x0, 0x0, 0xfffffe41) perf_event_open(0x0, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:34:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 717.657092] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.667472] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.668950] ip6_vti0: Invalid MTU 989 requested, hw min 1280 [ 717.678148] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.702357] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.710674] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.720463] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.728616] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.737056] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 717.745210] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 16:34:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) [ 717.753582] kvm [21156]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 16:34:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:18 executing program 5: r0 = getpgrp(0xffffffffffffffff) prlimit64(r0, 0x0, 0x0, 0x0) 16:34:18 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r11 = gettid() recvfrom$inet(0xffffffffffffffff, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r11, 0x14) 16:34:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)="ae1334ada5efbdefbd7add7ba551f07d2dec18dbc1ae13ceae59d7bfc8434444cc2b4934e8fd2e136f70ba5ad4082d13fb553c5432004db14e3a82c8f66b918b51d1ee5048dd384fc8aba32cb70d34b472375021ca8c11c50cd1ba67a4a2d220344190d4ccd3bfcd5fee82c88b7d271eddb583221d10ba1755a6c51b88f9e26287143ae0a40784532a4cc7a01e0f7d6b4dfd17fa46a11599d96f5f9bb10d64d6eed07dde22397f9c847e0e03269d6fadbe93984b26ab1c59a0437c294209eab6adc5d47a2c1b016a98", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000300)=""/204, 0xcc}], 0x1}, 0x0) 16:34:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:18 executing program 5: r0 = getpgrp(0xffffffffffffffff) prlimit64(r0, 0x0, 0x0, 0x0) 16:34:18 executing program 5: r0 = getpgrp(0xffffffffffffffff) prlimit64(r0, 0x0, 0x0, 0x0) 16:34:18 executing program 5: r0 = getpgrp(0xffffffffffffffff) prlimit64(r0, 0x0, 0x0, 0x0) 16:34:18 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) 16:34:18 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) 16:34:18 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) [ 720.620819] ip6_vti0: Invalid MTU 992 requested, hw min 1280 16:34:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="2c6d61787f7265fd29303978303030303030303030303030303030362c666f77ff7f000023935e0dee187eee7ff865d6c1ff003c294b289b12ffff0000901483d68ea7f804d8c2b31fe40ed335cde58cd4af7b697ddefa44c67464549705a88744b1ad520409b61afca2c95c3fc31ab11c40e96ad4710067a27878e05e32fcbf816f1dc61cce2dd976651a0820fc2cae95609eda62ed2c9704401818fd00009a364186a3f6a566989f6dc49ce76e29f6afd170b5f82d01bdd9b4b951cf1354e72e11fa1191a6fd177209569201354c641bfb5920637d6c82f826079f9bfe2101f846fc47b47d1dbc0f4b2edd87021d1fb30d95ebaae64a1e5a286d58af796d76d1e49b7ef5acf7945d48045afe8b67914314d375a2ecb8cdb66858ac8d2148dd71792abf43a09a59df1bd9004674e0969d5b2c76daade65118ac1577ad5d879c70c374911f49a6de71ade6d4663c6c376a3d9d78cdfd17d48bccb1c7aa5fc520927d35f05f35dbb00080cae02105416b1c65f6a06dfa94615868858c8a427c6987e0a297f33fe0b3a099fe67e694b85ef86032e264034adfaf6ed4ccc809683cd5ea195085e89283f95eeb55272693068b1ac252df07bd64449dc200270fc2c0ca24aa18acb2320a77de5924b9a7d8b4027f921dc1b48a10a4385225a2b7d1bd97603149f6653d9f1007c514d632a741cdc752dc1c81b81d35f0d1947f409a8df870b1207cd10224efd6b3a17f617dca23005be988d7bee5a190b553e5dc040b81ee7b86c52b8cc418f5335d1b34b9988ec7a7fc0b0a410658b038b975988659949ef4f7fcdaaf0fe85b2bf446fad8df920c14c0533966101dfb5b5a8cf4ffaa36cffc4ae42529a0d02ec8e9235a23e38ec0f732bd960763b000325e39634ad8dc895d69824e968f552ef184c148ed88778d041afc754022ad3bc69ed4a6c1fee1296e11b345906e1f0f2aff415fbd0000990d8e078ca5bd63161678d9c94db104657367aec3af924b1aff6ac243c0ee57d698a648df0cf450a5be87fa0e2f2a1985ad0218e5dc439fc20abc00ac0eb45f9c39", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:21 executing program 5: getpgrp(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) 16:34:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd73a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:21 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r11 = gettid() recvfrom$inet(0xffffffffffffffff, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r11, 0x14) 16:34:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)="ae1334ada5efbdefbd7add7ba551f07d2dec18dbc1ae13ceae59d7bfc8434444cc2b4934e8fd2e136f70ba5ad4082d13fb553c5432004db14e3a82c8f66b918b51d1ee5048dd384fc8aba32cb70d34b472375021ca8c11c50cd1ba67a4a2d220344190d4ccd3bfcd5fee82c88b7d271eddb583221d10ba1755a6c51b88f9e26287143ae0a40784532a4cc7a01e0f7d6b4dfd17fa46a11599d96f5f9bb10d64d6eed07dde22397f9c847e0e03269d6fadbe93984b26ab1c59a0437c294209eab6adc5d47a2c1b016a98", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000300)=""/204, 0xcc}], 0x1}, 0x0) 16:34:21 executing program 5: getpgrp(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) 16:34:21 executing program 5: getpgrp(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) 16:34:21 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) sendmmsg(r0, &(0x7f00000005c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}}], 0x1, 0x0) 16:34:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d593df8dbeb96a89b1b34edfc532b3c2d6868cbd81ca73044637badbe952", @ANYBLOB="e4539a0a6ea2d7f8ed85243011fa9dd2abfba9bbb77c8d084d6496df4ff71a560566"], 0x0, 0x40}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 723.682525] ip6_vti0: Invalid MTU 995 requested, hw min 1280 16:34:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet(0x2, 0x3, 0x7) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r8, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC=r6, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r7]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r9, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r10) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r10, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r13 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r17 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r17, 0x6609) fstat(r17, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r19, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r18, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r19, @ANYBLOB="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", @ANYRES16]) r20 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r20, 0x6609) fstat(r20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r22, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r21, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r22, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r11}, {0x2, 0x4, r5}, {0x2, 0x1, r12}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r16}, {0x2, 0x2, r5}, {0x2, 0x1, r18}, {0x2, 0x2, r21}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r23, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r24, 0x40001) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r23, r24, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r25}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 723.918854] ip6_vti0: Invalid MTU 998 requested, hw min 1280 16:34:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="5626267200053c07bc56760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:34:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)="ae1334ada5efbdefbd7add7ba551f07d2dec18dbc1ae13ceae59d7bfc8434444cc2b4934e8fd2e136f70ba5ad4082d13fb553c5432004db14e3a82c8f66b918b51d1ee5048dd384fc8aba32cb70d34b472375021ca8c11c50cd1ba67a4a2d220344190d4ccd3bfcd5fee82c88b7d271eddb583221d10ba1755a6c51b88f9e26287143ae0a40784532a4cc7a01e0f7d6b4dfd17fa46a11599d96f5f9bb10d64d6eed07dde22397f9c847e0e03269d6fadbe93984b26ab1c59a0437c294209eab6adc5d47a2c1b016a98", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000300)=""/204, 0xcc}], 0x1}, 0x0) 16:34:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:24 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup2(r2, r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r1, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r7 = dup2(r4, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) r10 = openat$cgroup_subtree(r8, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r10) ioctl$BLKRRPART(r7, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r11 = gettid() recvfrom$inet(0xffffffffffffffff, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r11, 0x14) 16:34:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x6) r3 = dup(r2) write$binfmt_elf64(r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000001a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000f0030000f8010000e80000003e0200000803000008030000080300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000000046e9bca35c5489ba385fbb2ecfa60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000697036746e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000006af895b6378b0000000040000000000000000000e00000010000000000000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000002000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000100000000000000ac1414aae000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003fdc2eb98728d093750f47c007c07e7c7c769f0df3b34fde2e5a009cb84ed469a43c12acc09e6c48e18a8871d643b917fd908bed7383a6ddcb3906e04b4042090f797e88ab9c7689d4ce3954456ee44dbd66431ddf2b5ff1292c882f8f4a27cd892cab1386ba348fdebb1861c344974524751743de438d919e3dcf947b54fcac7d5b7c4311b73ea4ce"], 0x440) r6 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r6, 0x29, 0x41, 0x0, 0x0) r7 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, 0x0, 0x0) mount$fuseblk(&(0x7f00000006c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r7, @ANYBLOB="2c726f6f64653d30d4113b003030303030303030e3000000303030303134303030302c", @ANYRESDEC=0x0, @ANYRESDEC, @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_ermissi\x00'/57, @ANYRESDEC=r5, @ANYRES16=r6]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900024, &(0x7f0000000bc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c08000000ec0b739167", @ANYRESDEC=r8, @ANYBLOB=',allow_other,max_read=0x0000000004000000,max_read=0x0000000000000007,allow_other,default_permissions,default_permissions,blksize=0x0000000000001400,max_read=0x0000000000000f63,fscontext=sysadm_u,obj_user=},smackfshat=+cgroup,hash,fowner>', @ANYPTR, @ANYRES16=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r9) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x8, {0x8, 0x3, 0x1}, 0x0, r5, r9, 0x5, 0x5, 0x800000000, 0xfffffffffffffff7, 0x0, 0x4133000000000, 0x7, 0x4, 0x6, 0x5, 0xc4e0, 0xd640, 0xffff, 0x80000000, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r12 = socket(0x10, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xffffffffffffff70) r16 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6609) fstat(r16, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r18, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r17, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8240fdfbeedc22d55b30100000000000000602fb60510c74f1592784f4232bd778b1a548da90648000016013f0546a5940f8d5a0f9f", @ANYRES64=r18, @ANYBLOB="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", @ANYRES16]) r19 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r19, 0x6609) fstat(r19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r21, 0x0, 0xcb, &(0x7f0000000000), 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1488, &(0x7f0000001640)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f5acd3ef01b943bf3845dca1270c73cca02000200", @ANYRESDEC=r20, @ANYBLOB="b6c3d4828b36b8f2e47773868b682c5278b6dfa25d120247a05e415fca5869317afcadd00334d67aaf9721ff4872a8241fdfbeedc22d55b38c6d41cb821c2cb7602fb60510c74f1592784f4232bd778b1a548da90648dd7416013f0546a5940f8d5a0f9f", @ANYRES64=r21, @ANYBLOB="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", @ANYRES16]) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x4, r10}, {0x2, 0x4, r5}, {0x2, 0x1, r11}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0x7, r15}, {0x2, 0x2, r5}, {0x2, 0x1, r17}, {0x2, 0x2, r20}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x4}}, 0x6c, 0x2) r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r22, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r23, 0x40001) connect$inet(r22, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r22, r23, 0x0, 0xffe4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r22, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_MASTER={0x8, 0x4, r24}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:34:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d593df8dbeb96a89b1b34edfc532b3c2d6868cbd81ca73044637badbe952", @ANYBLOB="e4539a0a6ea2d7f8ed85243011fa9dd2abfba9bbb77c8d084d6496df4ff71a560566"], 0x0, 0x40}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 726.680868] ip6_vti0: Invalid MTU 1000 requested, hw min 1280 16:34:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) socket(0x1, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000600)={0x7ff, 0x1}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x389ac0000000, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1c56a001a24882d44dfbef79811417b5a9f62f6ad14cbb967f7654aa3b900ccb0b99c85dc5cedf5332a1bbc1a8b51de0cc5d6af1b667d391c2cd6fb03b5ce2541ffadfbc71129ea44c971d1a606cfcec52ab92ef7f5c03f487a035e", 0x93, 0x80000000}, {&(0x7f0000000340)="dc137bf2a711c2a43f2cfa77ccd9c6b26f2e9eaafe1171c567da3d6f0304cf24d37d435b4e27829c475f638c4b", 0x2d, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000000580)="159d0a3be804eece42746c67620e881301ba7c066e26f4bfa8e596fb725e66a9ce136ee180a05fe3a6426c1eba470903f6065adc7b2e7cb239e0755796a6cc74833996c40af09a6ce7c6b8d62d37bc08a8cf72871fb8deab5d18b5896de0923966276b44ad1ca53a145ad1c51f7d4ca3df9a39813636", 0x76}, {&(0x7f0000001680)="bd518980527dd443947c45666633c7ca93dda7d89ae02fa7018897d2b000fbae0c846e749a5d68fb83b544a2d6c3419ec7fc97c48a3200c4497d65c631abe9e1e00544bb8540e03594ea1a865830d6af92412b21ed7fd2a0c114f554c5472ca9f7799fdd330b85fdfc0890798225f441ec075b872c68f2f4f4db3de8f25fccbff1fc3e5e71bf1a027af9d19ec7b835cade9c9a42f2da4c151840aec7df914dedec89df53f986dc2dc070332e1d8b8fbc0308e1a91953407b81d0398d3e96c493e487088ea8f671422a1dc3", 0xcb}], 0x8006, &(0x7f0000000640)=ANY=[@ANYBLOB="7d28cb1d4fa1fa5f1697a1d0ef9cb4edc37afa9ca7a6a8b1270b7eed5e43b751a0c8586b059624dfdd1da258fbfd8720f1"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0xf, 0x16, 0x137}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @reserved="381309bfe79f193e273661952120cdabf325720b3296ba67e34093161523f9a8"}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) 16:34:25 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000280)=0x91) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa2}, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$inet6(0xa, 0x5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup2(r1, r1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0xfffffffc}, 0x1c) connect$inet6(r0, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x5, 0x6, @multicast}, 0x14) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) r6 = dup2(r3, 0xffffffffffffffff) eventfd2(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe0, 0x0) r9 = openat$cgroup_subtree(r7, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r9) ioctl$BLKRRPART(r6, 0x125f, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x400040, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r10, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r10, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r10, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000800000", 0x82, 0x40001, 0x0, 0xffffffffffffffe2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmsg(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1}, 0x0) r11 = gettid() recvfrom$inet(r10, &(0x7f0000000140)=""/219, 0xdb, 0x0, 0x0, 0x0) tkill(r11, 0x14)