r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f78622783d23fc238a1d2147c1766fa643eba3002bef7184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91092a7a274568d0fd638212e0000710d0f9b7d5e0f1f834c5a9b602ac6"]) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)={0x28, 0x21, 0x1, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}]}, 0x28}], 0x1}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)={0x28, 0x21, 0x1, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}]}, 0x28}], 0x1}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/92, 0x8f}, {&(0x7f0000000500)=""/215, 0xfffffffffffffc92}, {&(0x7f0000000600)=""/241, 0xf1}, {&(0x7f0000000700)=""/2, 0x2}, {&(0x7f0000000740)=""/85, 0x55}], 0x5, &(0x7f0000000b80)=ANY=[@ANYBLOB="99da27dbd22adfcae7cc415a0120000001000000", @ANYRES32, @ANYRES32, @ANYRESHEX=r1, @ANYBLOB="000000001c00"/20, @ANYRES32=0x0, @ANYBLOB="5bdae017956e7a98ade24762b30a4221b2cf8b94f6ad845c253a133789e71614c3b84010e48d98c0cbb4480a96e615f33a927e4bf9c380078418a8a32a96975fa8940f2fdff60b0238c213a6f11983aace5d4695149c739725f2587656658378e4d0acd079695d27c546db8e0c8eb0c75395b29e31655a8a021cbd5b895070e40570d8500ce19591ebe8d654d963ab4b69a049820d68eecb6956b91356568b47c955c7916fb899df0b4f57f5952f9149843c72610790a47588e6adb9cfd466118b73d98b651b390f85d5c04bc0997ea56aadf9765786512dffa4262c0e6c77ba58baeff405f4655e37cea0ddebca8da9daa3bf83", @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r1, @ANYRES32=r3, @ANYRESDEC=r1, @ANYRES32, @ANYRES32, @ANYRESHEX, @ANYRES64=r2, @ANYRES32=r1, @ANYRES32, @ANYBLOB="ef0ac7fa27b30afc33e4401817af187718e5505c14bdda6caa29e834a8cae7d2ba99e32a689d43e786f3d85d06c24a0bff106af3ebfb43cdfc99bfa3d9f4b8c8d3171e"], 0x88}, 0x20) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000180)='net/icmp6\x00') futimesat(r5, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{}, {0x77359400}}) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x0, 0xaf8}, r4, 0x8000000000, 0xffffffffffffffff, 0x0) fork()