00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/284]}, 0x194) 20:01:35 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x78) 20:01:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0}, 0x2b0) 20:01:35 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:35 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x78) 20:01:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/284]}, 0x194) 20:01:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x78) [ 316.656166][T24224] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x78) 20:01:36 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x78) [ 316.956539][T24256] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a8010000697000"/284]}, 0x194) 20:01:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]}, 0x78) 20:01:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x78) 20:01:36 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]}, 0x78) 20:01:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]}, 0x78) 20:01:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) [ 317.596881][T24276] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:37 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:37 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]}, 0x78) 20:01:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) [ 318.019764][T24306] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:37 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]}, 0x78) 20:01:37 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/284]}, 0x194) 20:01:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaa"]}, 0x222) 20:01:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]}, 0x78) 20:01:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) 20:01:37 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a8010000697000"/284]}, 0x194) [ 318.632836][T24326] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/284]}, 0x194) 20:01:38 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/284]}, 0x194) 20:01:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) 20:01:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:38 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/284]}, 0x194) 20:01:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) 20:01:38 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) [ 319.057976][T24361] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) 20:01:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x11c, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/284]}, 0x194) 20:01:38 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:38 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) 20:01:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) 20:01:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) [ 319.476397][T24390] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:39 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) 20:01:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) 20:01:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) 20:01:39 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 320.088748][T24418] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:39 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) 20:01:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000000"]}, 0x29f) 20:01:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1aa, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x222) 20:01:39 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x29f) 20:01:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100"/497]}, 0x269) 20:01:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:39 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) [ 320.454784][T24438] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:40 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) 20:01:40 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) [ 320.768662][T24466] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 320.961620][T24460] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 320.992710][T24460] FAT-fs (loop1): Filesystem has been set read-only [ 321.015153][T24460] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 321.025179][T24460] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 321.034977][T24460] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 321.046694][T24457] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:01:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1f1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/497]}, 0x269) 20:01:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x29f) 20:01:40 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) 20:01:40 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) [ 321.323401][T24486] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:40 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) 20:01:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 20:01:40 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) 20:01:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) [ 321.720804][T24519] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa000000000000"]}, 0x2a8) 20:01:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x215, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/533]}, 0x28d) 20:01:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x29f) 20:01:41 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 322.054171][T24534] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000000"]}, 0x29f) 20:01:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 20:01:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000000"]}, 0x29f) 20:01:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/564]}, 0x2ac) 20:01:41 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x29f) [ 322.495129][T24572] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x29f) 20:01:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/564]}, 0x2ac) 20:01:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x227, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000000"]}, 0x29f) 20:01:42 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 323.034603][T24585] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 20:01:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 20:01:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/564]}, 0x2ac) 20:01:42 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa000000000000"]}, 0x2a8) 20:01:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 323.302705][T24607] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/566]}, 0x2ae) 20:01:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 20:01:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x230, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 20:01:43 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 324.008553][T24633] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:01:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:43 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000040)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 20:01:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/564]}, 0x2ac) 20:01:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/564]}, 0x2ac) 20:01:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/566]}, 0x2ae) [ 324.303764][T24643] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 324.313604][T24643] FAT-fs (loop0): Filesystem has been set read-only [ 324.324585][T24643] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 324.346305][T24643] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:01:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/564]}, 0x2ac) 20:01:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/566]}, 0x2ae) 20:01:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/564]}, 0x2ac) [ 324.350002][T24656] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 324.355394][T24643] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 324.383923][T24641] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:01:43 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) 20:01:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/564]}, 0x2ac) 20:01:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/567]}, 0x2af) 20:01:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x234, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/564]}, 0x2ac) [ 324.753601][T24689] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 324.793357][T24689] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 20:01:44 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/566]}, 0x2ae) 20:01:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/566]}, 0x2ae) 20:01:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/567]}, 0x2af) 20:01:44 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) 20:01:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/566]}, 0x2ae) [ 325.269278][T24719] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 325.358361][T24719] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 20:01:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:44 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/566]}, 0x2ae) 20:01:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/567]}, 0x2af) 20:01:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/566]}, 0x2ae) 20:01:44 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) [ 325.596533][T24734] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 325.654615][T24734] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 20:01:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x236, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/566]}, 0x2ae) 20:01:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x2) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) dup3(r0, r1, 0x0) 20:01:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/567]}, 0x2af) 20:01:45 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) 20:01:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/567]}, 0x2af) 20:01:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/567]}, 0x2af) [ 325.795184][T24745] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 325.806075][T24745] FAT-fs (loop0): Filesystem has been set read-only [ 325.850426][T24745] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 325.915115][T24762] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 325.941849][T24762] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 20:01:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/567]}, 0x2af) 20:01:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/567]}, 0x2af) 20:01:45 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) 20:01:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) [ 326.201304][T24781] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 326.295623][T24781] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 20:01:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x237, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabf0000000000000180c20000000000000000000000f000000070010000a801000069700000000000000000000000000000000000000000000000000000000000002000000000f500007f000001ac1414000000071438000000008420000000000000000000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaa00"/567]}, 0x2af) 20:01:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:46 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="25bca274769e620aa73452ffa7a0612687463915e388e63bd8aea872943afd874e2f98b579a7186270146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) 20:01:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 326.676735][T24755] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 326.684674][T24755] FAT-fs (loop1): Filesystem has been set read-only [ 326.750285][T24901] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 326.758485][T24901] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 20:01:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:46 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8, 0x0, 0x0, 0x1000000}}}}}, 0x0) 20:01:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:46 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) syz_genetlink_get_family_id$tipc(0x0) 20:01:46 executing program 3: syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 20:01:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 327.101314][T25022] sctp: [Deprecated]: syz-executor.4 (pid 25022) Use of int in maxseg socket option. [ 327.101314][T25022] Use struct sctp_assoc_value instead 20:01:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:46 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:46 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, [], 0x0, r0, 0x0, 0x20}, 0x3c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, 0x0, 0x2, 0x3ba, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=r3, 0x4) r4 = accept4(r2, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @host}, 0x0, 0x0) connect$bt_rfcomm(r4, &(0x7f0000000280)={0x1f, {0x7, 0x1000, 0x3, 0x800000004, 0xc2, 0x23}, 0xffffffffffffff16}, 0xa) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x2013, r5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffef3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x67b738df) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000480)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x306, @remote}, 0x2, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, 'bpq0\x00'}) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x3c000, 0x800}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write$cgroup_pid(r5, &(0x7f0000000580), 0x10) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f0000000100)={0x1c, 0xffffffffffffdbff, 0x4, 0x0, 0x6, 0x85}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000380), 0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) write$binfmt_elf32(r6, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r5, 0x5411, &(0x7f0000000440)) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x88a}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) 20:01:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:46 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) [ 327.355349][T25045] sctp: [Deprecated]: syz-executor.3 (pid 25045) Use of int in maxseg socket option. [ 327.355349][T25045] Use struct sctp_assoc_value instead 20:01:46 executing program 4: 20:01:46 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) [ 327.607617][T25058] sctp: [Deprecated]: syz-executor.3 (pid 25058) Use of int in maxseg socket option. [ 327.607617][T25058] Use struct sctp_assoc_value instead 20:01:47 executing program 4: 20:01:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:47 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:47 executing program 3: [ 328.033581][T25040] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 328.041437][T25040] FAT-fs (loop0): Filesystem has been set read-only 20:01:47 executing program 4: 20:01:47 executing program 3: 20:01:47 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:47 executing program 3: 20:01:47 executing program 4: 20:01:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:47 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:47 executing program 4: 20:01:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:48 executing program 3: 20:01:48 executing program 4: 20:01:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:48 executing program 3: 20:01:48 executing program 4: 20:01:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:48 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:48 executing program 4: 20:01:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:49 executing program 3: 20:01:49 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x0, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:49 executing program 4: 20:01:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'batadv0\x00?\bz\x00', 0xf7fffffffffffffd}) 20:01:49 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet6(0xa, 0x0, 0x0) 20:01:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x0, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:49 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x0, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) [ 330.615194][T25182] device batadv0 entered promiscuous mode [ 330.676471][T25182] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.698244][T25199] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 330.733089][T25199] FAT-fs (loop1): Filesystem has been set read-only [ 330.754126][T25173] device batadv0 left promiscuous mode [ 330.780543][T25199] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:01:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x0, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) [ 331.010069][T25182] device batadv0 entered promiscuous mode [ 331.034573][T25182] 8021q: adding VLAN 0 to HW filter on device batadv0 20:01:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) syz_open_procfs(0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:01:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x0, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 331.296930][T25220] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 331.309585][T25220] FAT-fs (loop1): Filesystem has been set read-only [ 331.374897][T25220] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:01:50 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet6(0xa, 0x0, 0x0) 20:01:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x0, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) [ 331.453908][T25220] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 331.490668][T25220] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:01:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 331.529216][T25214] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:01:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:51 executing program 3: 20:01:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:51 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet6(0xa, 0x0, 0x0) 20:01:51 executing program 3: 20:01:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:52 executing program 3: 20:01:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:52 executing program 3: 20:01:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:52 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet6(0xa, 0x0, 0x0) 20:01:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:52 executing program 3: 20:01:52 executing program 3: 20:01:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 20:01:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) 20:01:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 20:01:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x42}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:01:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) dup3(r0, r1, 0x0) 20:01:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x13a) 20:01:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 20:01:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:53 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 20:01:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 20:01:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x73fffb, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:55 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:55 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14740f05"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1000000000030) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:55 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x138) 20:01:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 336.244369][T25459] ptrace attach of "/root/syz-executor.3"[25458] was attempted by "/root/syz-executor.3"[25459] 20:01:55 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x822000, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:56 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, 0x0, 0x8) dup2(r1, r0) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7}, 0x7) 20:01:56 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:56 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:57 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x8002, 0x2000008000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x600]}, 0x2c) 20:01:57 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 20:01:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{0x9, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70}, {0x3, 0xffffffffd927d9bc, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3, 0x6}], 0x9}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB='p'], 0x1}}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000580)={0x9, 0x5, 0x0, 0x7, 0x8, 0x0, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:01:57 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:57 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 338.852185][T25587] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 338.870213][T25587] FAT-fs (loop0): Filesystem has been set read-only [ 338.877700][T25587] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 338.888924][T25585] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:01:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:58 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 20:01:58 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{0x9, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70}, {0x3, 0xffffffffd927d9bc, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3, 0x6}], 0x9}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB='p'], 0x1}}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000580)={0x9, 0x5, 0x0, 0x7, 0x8, 0x0, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:01:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 20:01:58 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:58 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:58 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) [ 339.607034][ T26] audit: type=1800 audit(1565553718.978:33): pid=25633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17521 res=0 20:01:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:01:59 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x20400000000003, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000380)="4c0000001200ff093ff7f6a7fbfd25a6008000000000000000683540150024001d001fc40280b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc8823079881a2ba", 0x4c}], 0x1}, 0x0) 20:01:59 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:01:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:59 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)='em1]systemself]cgroup#*em1ppp0,\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)=r0) add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000880)='big_key\x00', &(0x7f00000008c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x80000, &(0x7f0000000740)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0}, 0x80) r1 = msgget(0x0, 0x0) msgget$private(0x0, 0x49) msgctl$IPC_RMID(r1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000a80)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @null, 0xfffffffffffffffc, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getrandom(&(0x7f0000000540)=""/199, 0xc7, 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000000)={0x40000014}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x3, 0x9, 0x3473}) 20:01:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:01:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:01:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 20:02:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 20:02:00 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:02:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:00 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)='em1]systemself]cgroup#*em1ppp0,\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)=r0) add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000880)='big_key\x00', &(0x7f00000008c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x80000, &(0x7f0000000740)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0}, 0x80) r1 = msgget(0x0, 0x0) msgget$private(0x0, 0x49) msgctl$IPC_RMID(r1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000a80)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @null, 0xfffffffffffffffc, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getrandom(&(0x7f0000000540)=""/199, 0xc7, 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000000)={0x40000014}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x3, 0x9, 0x3473}) 20:02:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 20:02:00 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 20:02:00 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 20:02:01 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:02:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:01 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)='em1]systemself]cgroup#*em1ppp0,\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)=r0) add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000880)='big_key\x00', &(0x7f00000008c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x80000, &(0x7f0000000740)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0}, 0x80) r1 = msgget(0x0, 0x0) msgget$private(0x0, 0x49) msgctl$IPC_RMID(r1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000a80)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @null, 0xfffffffffffffffc, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getrandom(&(0x7f0000000540)=""/199, 0xc7, 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000000)={0x40000014}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x3, 0x9, 0x3473}) 20:02:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 20:02:01 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x11b190980d038060, 0x4) 20:02:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 20:02:01 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) 20:02:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) 20:02:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 20:02:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 20:02:02 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)='em1]systemself]cgroup#*em1ppp0,\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)=r0) add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000880)='big_key\x00', &(0x7f00000008c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x80000, &(0x7f0000000740)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0}, 0x80) r1 = msgget(0x0, 0x0) msgget$private(0x0, 0x49) msgctl$IPC_RMID(r1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000a80)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @null, 0xfffffffffffffffc, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getrandom(&(0x7f0000000540)=""/199, 0xc7, 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000000)={0x40000014}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x3, 0x9, 0x3473}) 20:02:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) 20:02:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:02:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), 0x4) 20:02:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:03 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), 0x4) 20:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c0000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:02:03 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), 0x4) 20:02:03 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)='em1]systemself]cgroup#*em1ppp0,\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)=r0) add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000880)='big_key\x00', &(0x7f00000008c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x80000, &(0x7f0000000740)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0}, 0x80) r1 = msgget(0x0, 0x0) msgget$private(0x0, 0x49) msgctl$IPC_RMID(r1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000a80)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @null, 0xfffffffffffffffc, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getrandom(&(0x7f0000000540)=""/199, 0xc7, 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000000)={0x40000014}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x3, 0x9, 0x3473}) 20:02:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 20:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c0000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x24, 0x1}, 0x24}}, 0x0) 20:02:03 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)='em1]systemself]cgroup#*em1ppp0,\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)=r0) add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000880)='big_key\x00', &(0x7f00000008c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x80000, &(0x7f0000000740)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0}, 0x80) r1 = msgget(0x0, 0x0) msgget$private(0x0, 0x49) msgctl$IPC_RMID(r1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000a80)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @null, 0xfffffffffffffffc, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getrandom(&(0x7f0000000540)=""/199, 0xc7, 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000000)={0x40000014}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x3, 0x9, 0x3473}) 20:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c0000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x24, 0x1}, 0x24}}, 0x0) 20:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:03 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100), 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 20:02:03 executing program 2: openat$pidfd(0xffffffffffffff9c, 0x0, 0xb47c2c40247158ea, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x27c) r1 = gettid() write$P9_RCREATE(r0, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RVERSION(r0, 0x0, 0x0) tkill(r1, 0x1000000000016) 20:02:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x24, 0x1}, 0x24}}, 0x0) 20:02:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000140)={0x20, 0x17, 0x101, 0x0, 0x0, {0x4}, [@nested={0xc, 0x16, [@typed={0x8, 0x0, @binary="e2"}]}]}, 0x20}}, 0x0) 20:02:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:04 executing program 3: 20:02:04 executing program 2: 20:02:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:04 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100), 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 20:02:04 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100), 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 20:02:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:04 executing program 2: 20:02:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 20:02:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) 20:02:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:05 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100), 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) [ 346.058267][T25895] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 346.066465][T25895] FAT-fs (loop0): Filesystem has been set read-only 20:02:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000950000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:05 executing program 2: 20:02:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000950000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:05 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100), 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 20:02:05 executing program 2: 20:02:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:06 executing program 2: 20:02:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000950000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:06 executing program 4: 20:02:06 executing program 4: 20:02:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:06 executing program 2: 20:02:06 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:06 executing program 2: 20:02:06 executing program 4: 20:02:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:06 executing program 4: 20:02:06 executing program 2: 20:02:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:06 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:06 executing program 4: 20:02:07 executing program 2: 20:02:07 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:07 executing program 4: 20:02:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:07 executing program 4: 20:02:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:07 executing program 2: 20:02:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:07 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:07 executing program 4: 20:02:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:07 executing program 2: 20:02:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:07 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:07 executing program 4: 20:02:07 executing program 2: 20:02:07 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:08 executing program 2: 20:02:08 executing program 4: 20:02:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:08 executing program 4: 20:02:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:08 executing program 2: 20:02:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:08 executing program 4: 20:02:08 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000840)=ANY=[@ANYBLOB="080000000000000000001000000000008300000000000000", @ANYPTR, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00\x00\x00\x00\x00\x00\x00', @ANYPTR, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00r\x00\x00\x00\x00\x00\x00\x00', @ANYPTR, @ANYBLOB="000000000000000000200000000000001f00000000000000", @ANYPTR, @ANYBLOB="000000000000000000001000000000002500000000000000", @ANYPTR, @ANYBLOB="0000000000000000f8e77b85989ee3ca2d"]) 20:02:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001240)="b765f9a6f0462908e9178632f68a1f320cd8665df5cf1cdd50f00daa2951e30b8c", 0x21) 20:02:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0x1f4, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:02:09 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff0000966f1503db0cfd2a0000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0xfdef, &(0x7f0000694ffe)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 20:02:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:09 executing program 2: r0 = socket(0x1e, 0x4000000000002, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000010c0)=@req3={0x4d2d, 0x0, 0x0, 0x1f}, 0x1c) sendmmsg(r0, &(0x7f00000096c0)=[{{0x0, 0x900, 0x0}}, {{&(0x7f0000002440)=@tipc=@nameseq={0x1e, 0x3}, 0xf, 0x0}}], 0x2, 0x101d0) 20:02:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:09 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:10 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 20:02:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 20:02:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfb90b5c5a425a393}) 20:02:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 20:02:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 20:02:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) 20:02:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) 20:02:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 20:02:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) 20:02:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0}) 20:02:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0}) 20:02:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0}) 20:02:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 20:02:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 354.332220][T26723] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:02:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 354.392695][T26723] FAT-fs (loop4): Filesystem has been set read-only 20:02:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 354.433501][T26723] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 354.459077][T26723] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 354.494133][T26723] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 20:02:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 354.658228][T26722] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 20:02:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 354.934727][T26771] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 355.034474][T26771] FAT-fs (loop2): Filesystem has been set read-only 20:02:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 355.176479][T26771] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 355.271608][T26770] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 20:02:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 20:02:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:17 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:17 executing program 1: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:17 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:17 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c0000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:17 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 358.405999][T26944] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 358.447697][T26944] FAT-fs (loop1): Filesystem has been set read-only [ 358.464356][T26944] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 358.494997][T26944] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 358.518722][T26944] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 358.555616][T26943] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c0000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:18 executing program 1: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:18 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c0000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:18 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:18 executing program 4: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:18 executing program 4: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 359.593703][T26973] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 359.629578][T26973] FAT-fs (loop1): Filesystem has been set read-only 20:02:19 executing program 1: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:19 executing program 4: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:19 executing program 3: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:19 executing program 4: modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:19 executing program 4: modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000950000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000950000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:19 executing program 4: modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:20 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040), 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:20 executing program 3: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) [ 360.671037][T27084] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.709774][T27084] FAT-fs (loop1): Filesystem has been set read-only 20:02:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d00000000000000950000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 360.760538][T27084] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 360.787846][T27084] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 360.797603][T27084] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:20 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040), 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 360.832348][T27079] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 360.957690][T27098] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.979301][T27098] FAT-fs (loop0): Filesystem has been set read-only 20:02:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 361.038255][T27098] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 361.064826][T27098] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 361.074532][T27098] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 361.086765][T27089] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:02:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:20 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040), 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 361.163917][T27104] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 361.219670][T27104] FAT-fs (loop3): Filesystem has been set read-only [ 361.228458][T27104] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 361.290562][T27104] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:02:20 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 361.344604][T27104] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:02:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d0000000000000095000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 361.486452][T27101] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:02:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:21 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:21 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:02:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 362.264501][T27166] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:02:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 362.305187][T27166] FAT-fs (loop2): Filesystem has been set read-only [ 362.350205][T27166] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 362.408179][T27166] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 362.462818][T27166] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 362.502344][T27165] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 20:02:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 363.058084][T27206] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:02:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 363.199881][T27206] FAT-fs (loop2): Filesystem has been set read-only [ 363.207230][T27206] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 363.285789][T27204] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 363.450774][T27215] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 363.463004][T27215] FAT-fs (loop3): Filesystem has been set read-only [ 363.471896][T27215] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 363.484121][T27215] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:02:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) [ 363.498332][T27215] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:02:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 363.680506][T27213] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:02:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) dup3(r0, r1, 0x80000) 20:02:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:23 executing program 4: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 20:02:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x0, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) [ 364.537486][T27279] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 364.582250][T27279] FAT-fs (loop4): Filesystem has been set read-only [ 364.750727][T27279] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 364.778201][T27279] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 20:02:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) [ 364.820667][T27279] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 364.962898][T27301] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:02:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061108c00000000002d000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) [ 365.039720][T27301] FAT-fs (loop2): Filesystem has been set read-only [ 365.050578][T27275] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 365.074522][T27301] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x0, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 365.118697][T27301] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 365.145331][T27301] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x1e, 0x4000000000002, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000010c0)=@req3={0x4d2d, 0x0, 0x0, 0x1f}, 0x1c) recvmmsg(r0, &(0x7f0000007b80)=[{{&(0x7f0000001100)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001180)=""/140, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 20:02:24 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x1e, 0x4000000000002, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000010c0)=@req3={0x4d2d, 0x0, 0x0, 0x1f}, 0x1c) recvmmsg(r1, &(0x7f0000007b80)=[{{&(0x7f0000001100)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001180)=""/140, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) [ 365.170292][T27292] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:24 executing program 5: getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000140)=""/136) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() modify_ldt$write2(0x11, &(0x7f0000000040)={0x8d3}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$smack_current(0xffffffffffffffff, &(0x7f0000000880)='%eth1wlan0md5sumvboxnet0vboxnet1\x00', 0x21) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x9, 0xa, 0x3) accept$inet(r0, 0x0, &(0x7f00000006c0)) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) sendmsg$sock(r1, &(0x7f0000000840)={&(0x7f0000000240)=@ethernet={0x1, @link_local}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000002c0)="edfbcf9c5333076fb10cf4ef1700b9d1921ec1706e8be0f0426521cdee90ff919dcef4fb872df20aef7d0f7e7f62daea3391164c2991f952034b3faaca8f045b82a26128aaa32fbe1cfd1e2aaa0ec6f1abef32fd2abf1c77f41fae5b9f597be7a200e763db9aed66a6ff31c4ac81cc3ba878be3eadd3c149a65dead653a318a093a7c1106cdc9b7cdfa6821c1041221ee95c1b6b71dad711677ffdb53e2b36fdec336d26ae52f0ed74b4c154d95472ae8f8a6d16c2aa69206f5f02c1f997a63ed9250049ac2e026e7d3afdd2a694cf954ba735c4a4d92480d1450e03bf089532ad3ad01919ccd4b2f12e78c6ced2", 0xee}, {&(0x7f00000003c0)="4e1351c57bdcc830ebdb4f0bbf26dafd3c5f4650df709a278c0e6c06bd2637485e39c0cdc1d86cde53999e005203ab59d59f87fefa2987ddf46527df0db181eca2fae8c409cf2189ceec610c0ac71effc6bddaa1781d1dec3762f4c6f64b7e1747c2260698250bf5e876226480b442c63339b5073126c668a664b7586edfe37252c660fdd70273caaae92a7512ad63a654554480ea9a2c1374955e365776df0f52b518f64c8dfce06cb9057d111c264a65d8c3d1ac268f9a", 0xb8}, {&(0x7f0000000480)="95c9b1ec6c1b4f7385d86cf29a491d91290908fa385e5ee7be2c6b6708b109918e31cbe2aeba5e97e9f99da03dfc0649280e903b880f3eb6c962e06a41396a3ed9c76ea20046bf0fce2f3794655bb9931414b4911891f9e5277f7942d349a4277dff1c778ec974f802a97b75192d0eeaacb58ea308c9720590216e3cf1bfd299cc21b6df7ff55649633e83672b86a0383951115e0c4f3a09e9df7b768f25d601", 0xa0}, {&(0x7f0000000600)="ba807612c4f2885d34a7d1", 0xb}, {&(0x7f00000006c0)}, {&(0x7f0000000700)}], 0x6}, 0x40) 20:02:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f00000005c0)}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 20:02:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x2) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) dup3(r0, r1, 0x0) 20:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x0, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:26 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = dup2(r0, r0) sendmmsg$unix(r1, &(0x7f0000001640)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) 20:02:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:26 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:26 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:26 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a, 0x1}, 0x14}}, 0x0) 20:02:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f00000005c0)}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 20:02:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f00000005c0)}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 20:02:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44004) fallocate(r1, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000100)=0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) close(r0) [ 367.749166][T27737] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) [ 367.812292][T27737] FAT-fs (loop1): Filesystem has been set read-only [ 367.831148][T27737] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44004) fallocate(r1, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000100)=0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) close(r0) 20:02:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20:02:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44004) fallocate(r1, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000100)=0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) close(r0) 20:02:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20:02:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44004) fallocate(r1, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000100)=0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) close(r0) [ 368.585723][T27998] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 368.650699][T27998] FAT-fs (loop2): Filesystem has been set read-only [ 368.691672][T27998] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 20:02:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 368.844722][T28012] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 368.869195][T28012] FAT-fs (loop3): Filesystem has been set read-only 20:02:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 368.939411][T27886] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 368.940675][T28012] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 368.984967][T27886] FAT-fs (loop1): Filesystem has been set read-only [ 369.003936][T28012] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:02:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 20:02:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) dup3(r0, r1, 0x80000) [ 369.060611][T28012] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 369.120619][T28107] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 369.140692][T28001] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 369.153297][T28107] FAT-fs (loop2): Filesystem has been set read-only 20:02:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) [ 369.170779][T28107] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:28 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x2, 0x1) 20:02:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x1) 20:02:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 20:02:28 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x2, 0x1) 20:02:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 20:02:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x1) 20:02:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f00000005c0)}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:29 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x2, 0x1) 20:02:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 20:02:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a}, 0x14}}, 0x0) 20:02:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:29 executing program 3: socket$inet(0x2, 0x2, 0x1) 20:02:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f00000005c0)}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 20:02:29 executing program 3: socket$inet(0x2, 0x2, 0x1) 20:02:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a}, 0x14}}, 0x0) 20:02:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 370.900190][T28354] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 370.930432][T28202] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 370.950553][T28354] FAT-fs (loop1): Filesystem has been set read-only [ 370.957401][T28202] FAT-fs (loop0): Filesystem has been set read-only [ 370.965257][T28354] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:30 executing program 3: socket$inet(0x2, 0x2, 0x1) 20:02:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x2a}, 0x14}}, 0x0) 20:02:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 370.991922][T28333] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:30 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x0, 0x1) 20:02:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x21) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 371.364210][T28451] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 371.373514][T28451] FAT-fs (loop0): Filesystem has been set read-only 20:02:30 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x0, 0x1) [ 371.416130][T28451] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 20:02:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:31 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x0, 0x1) 20:02:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:31 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x2, 0x0) 20:02:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:31 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x2, 0x0) 20:02:31 executing program 3: setgroups(0x0, 0x0) socket$inet(0x2, 0x2, 0x0) 20:02:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"c5c48455550c5f15d6a1e54e8434d392b1ee8ce0d8cc789e6f9f5fff37ea66e3ca2631545d2fac4abc17eb7ac022137c40ce9850330e934af106b6d2b7b23ab19ac6157f94543f7759d7d90386c0a66d13d3e29cd3c6af3aacf0403dfd57a8f8135dc35686b0919abd7055617083c2d27e3b8f482c0f739c8d5b6b8550e111346a569c4ef7974920a0d7d047f3aa354d1ecdd6032a60c603c404884d346b4f5f2a11da56be949d0f7631fc8cfaaad5c4a62696e3e255e89ea6a55cd3d7c072f17a1259489e5c8c35e774bdf939b28c750dbbcabb6f8243e7ddc524c53053d507b8d8841c66088bb387c003a38c6b56c6d3943436d3bfaee3a64f70cf0786eeefcb20c20d6ccab79d6b56c389e2c2036dd5c530cf9375fcdfc5c64ed37d249442e633724fc2a1c05ceb01c61a1ec83aa77af2a86431dbd70b1f57d83b558d5b7f991e59e4de3d94ecfd0d1ee35e28b03fc0c4edf919b649dbe0bee545c8a523de067f6d4c93585430d396a84a8128244e7880b3fb27d3e25bbdae3248a60f3835a8e5c1b8ec9054f0b28c3b8f3bb8805756908d313f77fe38934b57b1626bf795f20ded88ac5593dfd331d6ee199ae59864a789c50a0716705a5066680491ae4865f94eb777f1af9cecf98eba79e57ba4f056fc2faafc2b6b876323a192fad3e9e2328191df6def6cc8a74e7bf7032a69810371780f6035b205461f06194bee219f01225d7770067d4b8368b6e76cad966e9c68b3fa9129196dc06422e56a72c96dd97c436c97fc9c0fafbe9a70db131c4ccc0c16e37b3dd16b47c80c8dbf457f5eeb2a0bd1bd121d55092b7a421af41520af3a14d021ac7a5b687be522b7077604441a420679cc1f7dc60c6a7a9c38d5cc925f45180bf6c3d03296df35e80cee74a9d5112ad31d9f73a929f26ab98b78034136f5c780db45f6685ef241766a1b1e6b1022867fee580f6d4edd7209d80a69d5a9c14f5c8f40d0146fd345c293f8f528fd0f769ba1d3e1afb2d7ecc7642d84f5427bc7eb8d3df8587fdf9c8a1ae6fb8da5f4c7f41dcc4357aa174bc748f2b7b936acf1a571b37051f582e64662547b5b5a300dad70abe401d31ab0ee0f954836e504b2600fac22a7563f765a5e28a9c8e5070f87c7108d2bba9dd471e07f853794ecc5b07ed9613474efee45e3cbf4d1e8731f6f2fc4916eeb5477e38618149221fdcb7fa0b96dc6d93300310ac036e2bca6de88be17d01ef15da72524dc3c3414aeb8035892e6cb9a8a8e0ede1f083fe121e6d968e2c5974db5a86f9087e11c0e07ed02df3cf64be47e80c63925975d2514335b6cd952154bbc1bf2b52adf0c6529d9d05acf16f5b2178395e7df8ad6223d19a38d63d6785ef1fc69100b79a92325e358f75f8213f858e725fc0c1246ad2f0c1cdb3fc933e7ba971de2707689bfe56cc62cb0179b090d83435d3b"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"c5c48455550c5f15d6a1e54e8434d392b1ee8ce0d8cc789e6f9f5fff37ea66e3ca2631545d2fac4abc17eb7ac022137c40ce9850330e934af106b6d2b7b23ab19ac6157f94543f7759d7d90386c0a66d13d3e29cd3c6af3aacf0403dfd57a8f8135dc35686b0919abd7055617083c2d27e3b8f482c0f739c8d5b6b8550e111346a569c4ef7974920a0d7d047f3aa354d1ecdd6032a60c603c404884d346b4f5f2a11da56be949d0f7631fc8cfaaad5c4a62696e3e255e89ea6a55cd3d7c072f17a1259489e5c8c35e774bdf939b28c750dbbcabb6f8243e7ddc524c53053d507b8d8841c66088bb387c003a38c6b56c6d3943436d3bfaee3a64f70cf0786eeefcb20c20d6ccab79d6b56c389e2c2036dd5c530cf9375fcdfc5c64ed37d249442e633724fc2a1c05ceb01c61a1ec83aa77af2a86431dbd70b1f57d83b558d5b7f991e59e4de3d94ecfd0d1ee35e28b03fc0c4edf919b649dbe0bee545c8a523de067f6d4c93585430d396a84a8128244e7880b3fb27d3e25bbdae3248a60f3835a8e5c1b8ec9054f0b28c3b8f3bb8805756908d313f77fe38934b57b1626bf795f20ded88ac5593dfd331d6ee199ae59864a789c50a0716705a5066680491ae4865f94eb777f1af9cecf98eba79e57ba4f056fc2faafc2b6b876323a192fad3e9e2328191df6def6cc8a74e7bf7032a69810371780f6035b205461f06194bee219f01225d7770067d4b8368b6e76cad966e9c68b3fa9129196dc06422e56a72c96dd97c436c97fc9c0fafbe9a70db131c4ccc0c16e37b3dd16b47c80c8dbf457f5eeb2a0bd1bd121d55092b7a421af41520af3a14d021ac7a5b687be522b7077604441a420679cc1f7dc60c6a7a9c38d5cc925f45180bf6c3d03296df35e80cee74a9d5112ad31d9f73a929f26ab98b78034136f5c780db45f6685ef241766a1b1e6b1022867fee580f6d4edd7209d80a69d5a9c14f5c8f40d0146fd345c293f8f528fd0f769ba1d3e1afb2d7ecc7642d84f5427bc7eb8d3df8587fdf9c8a1ae6fb8da5f4c7f41dcc4357aa174bc748f2b7b936acf1a571b37051f582e64662547b5b5a300dad70abe401d31ab0ee0f954836e504b2600fac22a7563f765a5e28a9c8e5070f87c7108d2bba9dd471e07f853794ecc5b07ed9613474efee45e3cbf4d1e8731f6f2fc4916eeb5477e38618149221fdcb7fa0b96dc6d93300310ac036e2bca6de88be17d01ef15da72524dc3c3414aeb8035892e6cb9a8a8e0ede1f083fe121e6d968e2c5974db5a86f9087e11c0e07ed02df3cf64be47e80c63925975d2514335b6cd952154bbc1bf2b52adf0c6529d9d05acf16f5b2178395e7df8ad6223d19a38d63d6785ef1fc69100b79a92325e358f75f8213f858e725fc0c1246ad2f0c1cdb3fc933e7ba971de2707689bfe56cc62cb0179b090d83435d3b"}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 20:02:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"c5c48455550c5f15d6a1e54e8434d392b1ee8ce0d8cc789e6f9f5fff37ea66e3ca2631545d2fac4abc17eb7ac022137c40ce9850330e934af106b6d2b7b23ab19ac6157f94543f7759d7d90386c0a66d13d3e29cd3c6af3aacf0403dfd57a8f8135dc35686b0919abd7055617083c2d27e3b8f482c0f739c8d5b6b8550e111346a569c4ef7974920a0d7d047f3aa354d1ecdd6032a60c603c404884d346b4f5f2a11da56be949d0f7631fc8cfaaad5c4a62696e3e255e89ea6a55cd3d7c072f17a1259489e5c8c35e774bdf939b28c750dbbcabb6f8243e7ddc524c53053d507b8d8841c66088bb387c003a38c6b56c6d3943436d3bfaee3a64f70cf0786eeefcb20c20d6ccab79d6b56c389e2c2036dd5c530cf9375fcdfc5c64ed37d249442e633724fc2a1c05ceb01c61a1ec83aa77af2a86431dbd70b1f57d83b558d5b7f991e59e4de3d94ecfd0d1ee35e28b03fc0c4edf919b649dbe0bee545c8a523de067f6d4c93585430d396a84a8128244e7880b3fb27d3e25bbdae3248a60f3835a8e5c1b8ec9054f0b28c3b8f3bb8805756908d313f77fe38934b57b1626bf795f20ded88ac5593dfd331d6ee199ae59864a789c50a0716705a5066680491ae4865f94eb777f1af9cecf98eba79e57ba4f056fc2faafc2b6b876323a192fad3e9e2328191df6def6cc8a74e7bf7032a69810371780f6035b205461f06194bee219f01225d7770067d4b8368b6e76cad966e9c68b3fa9129196dc06422e56a72c96dd97c436c97fc9c0fafbe9a70db131c4ccc0c16e37b3dd16b47c80c8dbf457f5eeb2a0bd1bd121d55092b7a421af41520af3a14d021ac7a5b687be522b7077604441a420679cc1f7dc60c6a7a9c38d5cc925f45180bf6c3d03296df35e80cee74a9d5112ad31d9f73a929f26ab98b78034136f5c780db45f6685ef241766a1b1e6b1022867fee580f6d4edd7209d80a69d5a9c14f5c8f40d0146fd345c293f8f528fd0f769ba1d3e1afb2d7ecc7642d84f5427bc7eb8d3df8587fdf9c8a1ae6fb8da5f4c7f41dcc4357aa174bc748f2b7b936acf1a571b37051f582e64662547b5b5a300dad70abe401d31ab0ee0f954836e504b2600fac22a7563f765a5e28a9c8e5070f87c7108d2bba9dd471e07f853794ecc5b07ed9613474efee45e3cbf4d1e8731f6f2fc4916eeb5477e38618149221fdcb7fa0b96dc6d93300310ac036e2bca6de88be17d01ef15da72524dc3c3414aeb8035892e6cb9a8a8e0ede1f083fe121e6d968e2c5974db5a86f9087e11c0e07ed02df3cf64be47e80c63925975d2514335b6cd952154bbc1bf2b52adf0c6529d9d05acf16f5b2178395e7df8ad6223d19a38d63d6785ef1fc69100b79a92325e358f75f8213f858e725fc0c1246ad2f0c1cdb3fc933e7ba971de2707689bfe56cc62cb0179b090d83435d3b"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 20:02:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {0x0}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 20:02:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {0x0}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"c5c48455550c5f15d6a1e54e8434d392b1ee8ce0d8cc789e6f9f5fff37ea66e3ca2631545d2fac4abc17eb7ac022137c40ce9850330e934af106b6d2b7b23ab19ac6157f94543f7759d7d90386c0a66d13d3e29cd3c6af3aacf0403dfd57a8f8135dc35686b0919abd7055617083c2d27e3b8f482c0f739c8d5b6b8550e111346a569c4ef7974920a0d7d047f3aa354d1ecdd6032a60c603c404884d346b4f5f2a11da56be949d0f7631fc8cfaaad5c4a62696e3e255e89ea6a55cd3d7c072f17a1259489e5c8c35e774bdf939b28c750dbbcabb6f8243e7ddc524c53053d507b8d8841c66088bb387c003a38c6b56c6d3943436d3bfaee3a64f70cf0786eeefcb20c20d6ccab79d6b56c389e2c2036dd5c530cf9375fcdfc5c64ed37d249442e633724fc2a1c05ceb01c61a1ec83aa77af2a86431dbd70b1f57d83b558d5b7f991e59e4de3d94ecfd0d1ee35e28b03fc0c4edf919b649dbe0bee545c8a523de067f6d4c93585430d396a84a8128244e7880b3fb27d3e25bbdae3248a60f3835a8e5c1b8ec9054f0b28c3b8f3bb8805756908d313f77fe38934b57b1626bf795f20ded88ac5593dfd331d6ee199ae59864a789c50a0716705a5066680491ae4865f94eb777f1af9cecf98eba79e57ba4f056fc2faafc2b6b876323a192fad3e9e2328191df6def6cc8a74e7bf7032a69810371780f6035b205461f06194bee219f01225d7770067d4b8368b6e76cad966e9c68b3fa9129196dc06422e56a72c96dd97c436c97fc9c0fafbe9a70db131c4ccc0c16e37b3dd16b47c80c8dbf457f5eeb2a0bd1bd121d55092b7a421af41520af3a14d021ac7a5b687be522b7077604441a420679cc1f7dc60c6a7a9c38d5cc925f45180bf6c3d03296df35e80cee74a9d5112ad31d9f73a929f26ab98b78034136f5c780db45f6685ef241766a1b1e6b1022867fee580f6d4edd7209d80a69d5a9c14f5c8f40d0146fd345c293f8f528fd0f769ba1d3e1afb2d7ecc7642d84f5427bc7eb8d3df8587fdf9c8a1ae6fb8da5f4c7f41dcc4357aa174bc748f2b7b936acf1a571b37051f582e64662547b5b5a300dad70abe401d31ab0ee0f954836e504b2600fac22a7563f765a5e28a9c8e5070f87c7108d2bba9dd471e07f853794ecc5b07ed9613474efee45e3cbf4d1e8731f6f2fc4916eeb5477e38618149221fdcb7fa0b96dc6d93300310ac036e2bca6de88be17d01ef15da72524dc3c3414aeb8035892e6cb9a8a8e0ede1f083fe121e6d968e2c5974db5a86f9087e11c0e07ed02df3cf64be47e80c63925975d2514335b6cd952154bbc1bf2b52adf0c6529d9d05acf16f5b2178395e7df8ad6223d19a38d63d6785ef1fc69100b79a92325e358f75f8213f858e725fc0c1246ad2f0c1cdb3fc933e7ba971de2707689bfe56cc62cb0179b090d83435d3b"}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {0x0}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:36 executing program 5: sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"c5c48455550c5f15d6a1e54e8434d392b1ee8ce0d8cc789e6f9f5fff37ea66e3ca2631545d2fac4abc17eb7ac022137c40ce9850330e934af106b6d2b7b23ab19ac6157f94543f7759d7d90386c0a66d13d3e29cd3c6af3aacf0403dfd57a8f8135dc35686b0919abd7055617083c2d27e3b8f482c0f739c8d5b6b8550e111346a569c4ef7974920a0d7d047f3aa354d1ecdd6032a60c603c404884d346b4f5f2a11da56be949d0f7631fc8cfaaad5c4a62696e3e255e89ea6a55cd3d7c072f17a1259489e5c8c35e774bdf939b28c750dbbcabb6f8243e7ddc524c53053d507b8d8841c66088bb387c003a38c6b56c6d3943436d3bfaee3a64f70cf0786eeefcb20c20d6ccab79d6b56c389e2c2036dd5c530cf9375fcdfc5c64ed37d249442e633724fc2a1c05ceb01c61a1ec83aa77af2a86431dbd70b1f57d83b558d5b7f991e59e4de3d94ecfd0d1ee35e28b03fc0c4edf919b649dbe0bee545c8a523de067f6d4c93585430d396a84a8128244e7880b3fb27d3e25bbdae3248a60f3835a8e5c1b8ec9054f0b28c3b8f3bb8805756908d313f77fe38934b57b1626bf795f20ded88ac5593dfd331d6ee199ae59864a789c50a0716705a5066680491ae4865f94eb777f1af9cecf98eba79e57ba4f056fc2faafc2b6b876323a192fad3e9e2328191df6def6cc8a74e7bf7032a69810371780f6035b205461f06194bee219f01225d7770067d4b8368b6e76cad966e9c68b3fa9129196dc06422e56a72c96dd97c436c97fc9c0fafbe9a70db131c4ccc0c16e37b3dd16b47c80c8dbf457f5eeb2a0bd1bd121d55092b7a421af41520af3a14d021ac7a5b687be522b7077604441a420679cc1f7dc60c6a7a9c38d5cc925f45180bf6c3d03296df35e80cee74a9d5112ad31d9f73a929f26ab98b78034136f5c780db45f6685ef241766a1b1e6b1022867fee580f6d4edd7209d80a69d5a9c14f5c8f40d0146fd345c293f8f528fd0f769ba1d3e1afb2d7ecc7642d84f5427bc7eb8d3df8587fdf9c8a1ae6fb8da5f4c7f41dcc4357aa174bc748f2b7b936acf1a571b37051f582e64662547b5b5a300dad70abe401d31ab0ee0f954836e504b2600fac22a7563f765a5e28a9c8e5070f87c7108d2bba9dd471e07f853794ecc5b07ed9613474efee45e3cbf4d1e8731f6f2fc4916eeb5477e38618149221fdcb7fa0b96dc6d93300310ac036e2bca6de88be17d01ef15da72524dc3c3414aeb8035892e6cb9a8a8e0ede1f083fe121e6d968e2c5974db5a86f9087e11c0e07ed02df3cf64be47e80c63925975d2514335b6cd952154bbc1bf2b52adf0c6529d9d05acf16f5b2178395e7df8ad6223d19a38d63d6785ef1fc69100b79a92325e358f75f8213f858e725fc0c1246ad2f0c1cdb3fc933e7ba971de2707689bfe56cc62cb0179b090d83435d3b"}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 377.790575][T28890] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 377.815635][T28890] FAT-fs (loop1): Filesystem has been set read-only 20:02:37 executing program 5: sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 377.881214][T28890] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 377.941106][T28890] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 377.987072][T28890] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 378.056887][T28886] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:37 executing program 5: sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 378.688564][T28945] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 378.728053][T28945] FAT-fs (loop1): Filesystem has been set read-only 20:02:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 378.740423][T28945] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 378.757504][T28945] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 378.767969][T28945] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 378.836507][T28938] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 379.315990][T28987] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 379.384803][T28987] FAT-fs (loop0): Filesystem has been set read-only [ 379.413868][T28987] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:02:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 379.482970][T28987] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 379.520992][T28987] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 379.574963][T28984] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:02:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:39 executing program 0: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:40 executing program 0: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:40 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f064", 0x49}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:40 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:41 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f064", 0x49}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:41 executing program 0: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 20:02:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 381.964799][T29136] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:02:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 382.011461][T29136] FAT-fs (loop2): Filesystem has been set read-only [ 382.044193][T29136] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 382.054251][T29136] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 382.115073][T29136] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f064", 0x49}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 382.273370][T29134] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc", 0x6d}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc", 0x6d}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 385.407509][T29529] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:02:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 385.513269][T29529] FAT-fs (loop0): Filesystem has been set read-only [ 385.550324][T29529] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:02:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc", 0x6d}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 385.590025][T29528] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:02:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 385.719833][T29542] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 385.749769][T29542] FAT-fs (loop2): Filesystem has been set read-only 20:02:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 385.772661][T29542] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 386.037099][T29568] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 386.144161][T29568] FAT-fs (loop1): Filesystem has been set read-only 20:02:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 386.193796][T29568] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 386.347700][T29588] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 386.420775][T29588] FAT-fs (loop2): Filesystem has been set read-only [ 386.442119][T29588] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 20:02:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 387.718419][T29632] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 387.747748][T29761] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 387.758770][T29761] FAT-fs (loop1): Filesystem has been set read-only [ 387.779943][T29761] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 387.798564][T29632] FAT-fs (loop0): Filesystem has been set read-only [ 387.806581][T29761] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 387.837302][T29761] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 387.895898][T29758] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 20:02:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 388.309163][T29778] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 388.350031][T29778] FAT-fs (loop0): Filesystem has been set read-only [ 388.392613][T29778] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 388.437695][T29778] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 388.475840][T29778] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:02:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 388.504759][T29777] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:02:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b824", 0x88}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x0, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 20:02:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 20:02:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 389.515387][T29835] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 389.564223][T29835] FAT-fs (loop1): Filesystem has been set read-only 20:02:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x0, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b824", 0x88}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 20:02:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='security.apparmor\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 20:02:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00']) 20:02:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 20:02:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)) 20:02:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x0, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b824", 0x88}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b824", 0x88}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f4", 0x8d}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) 20:02:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x840000000002, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f", 0x7f}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000001c0)=""/27) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 392.145461][T30289] FAT-fs (loop0): invalid media value (0xca) [ 392.164532][T30289] FAT-fs (loop0): Can't find a valid FAT filesystem 20:02:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0xff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000740)="4a13408ffe67d1ae947ff37654bd23092e7481a533ee0cdd2eb8d47beb75d17dbd761e3b5b7dca3100fd2a023af5f6649130ce7577274358d58b775dc0d97f8c9392b307872579f06473b352983a51404ba223a5e845db07213d2036fbb650a8d9da6b871aee4946b2ccfccadc9a41c42f0e0a12ca03849e6cb2df0851437f8c1ad99e2e1470b82407c39586f460207c12", 0x91}], 0x2, 0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x2b) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff9970763"], 0x5d) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r4, &(0x7f0000000000)=@known='security.apparmor\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e378c905dda4cf0c4f16e53a75c6669774bca4273797a5d74756e0000"], 0x20) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x80000) [ 392.234457][T30299] WARNING: CPU: 1 PID: 30299 at fs/block_dev.c:1899 __blkdev_put+0x6ba/0x810 [ 392.243313][T30299] Kernel panic - not syncing: panic_on_warn set ... [ 392.249915][T30299] CPU: 1 PID: 30299 Comm: blkid Not tainted 5.3.0-rc3-next-20190809 #63 [ 392.258232][T30299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.268300][T30299] Call Trace: [ 392.271623][T30299] dump_stack+0x172/0x1f0 [ 392.275987][T30299] ? __blkdev_put+0x5d0/0x810 [ 392.280686][T30299] panic+0x2dc/0x755 [ 392.284585][T30299] ? add_taint.cold+0x16/0x16 [ 392.289281][T30299] ? __kasan_check_write+0x14/0x20 [ 392.294404][T30299] ? __warn.cold+0x5/0x4c [ 392.298742][T30299] ? __warn+0xe7/0x1e0 [ 392.302820][T30299] ? __blkdev_put+0x6ba/0x810 [ 392.307503][T30299] __warn.cold+0x20/0x4c [ 392.311750][T30299] ? __blkdev_put+0x6ba/0x810 [ 392.316443][T30299] report_bug+0x263/0x2b0 [ 392.317753][T30412] kobject: 'loop1' (0000000041b73e52): kobject_uevent_env [ 392.320806][T30299] do_error_trap+0x11b/0x200 [ 392.320827][T30299] do_invalid_op+0x37/0x50 [ 392.336908][T30299] ? __blkdev_put+0x6ba/0x810 [ 392.338732][T30412] kobject: 'loop1' (0000000041b73e52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 392.341612][T30299] invalid_op+0x23/0x30 [ 392.341627][T30299] RIP: 0010:__blkdev_put+0x6ba/0x810 [ 392.341649][T30299] Code: 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 24 fd ff ff 48 8b bd 50 ff ff ff e8 90 5d e6 ff e9 13 fd ff ff e8 46 6f ab ff <0f> 0b e9 dc fa ff ff 48 89 cf e8 57 5d e6 ff e9 6a fa ff ff 48 8b [ 392.380790][T30299] RSP: 0018:ffff88805a207c90 EFLAGS: 00010293 [ 392.386864][T30299] RAX: ffff888059fbc4c0 RBX: ffff888092ba3880 RCX: ffffffff81c6a4c4 [ 392.394864][T30299] RDX: 0000000000000000 RSI: ffffffff81c6a9ea RDI: 0000000000000005 [ 392.402835][T30299] RBP: ffff88805a207d88 R08: ffff888059fbc4c0 R09: ffffed1012574714 [ 392.410820][T30299] R10: ffff88805a207c80 R11: ffff888092ba389f R12: 0000000000000002 [ 392.418795][T30299] R13: dffffc0000000000 R14: ffff888092ba3898 R15: ffff888092ba3898 [ 392.426784][T30299] ? __blkdev_put+0x194/0x810 [ 392.431462][T30299] ? __blkdev_put+0x6ba/0x810 [ 392.436176][T30299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.442430][T30299] ? bd_set_size+0xb0/0xb0 [ 392.446849][T30299] ? wait_for_completion+0x440/0x440 [ 392.452145][T30299] blkdev_put+0x98/0x560 [ 392.456398][T30299] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 392.462646][T30299] blkdev_close+0x8b/0xb0 [ 392.466996][T30299] __fput+0x2ff/0x890 [ 392.470987][T30299] ? blkdev_put+0x560/0x560 [ 392.475494][T30299] ____fput+0x16/0x20 [ 392.479489][T30299] task_work_run+0x145/0x1c0 [ 392.484110][T30299] exit_to_usermode_loop+0x316/0x380 [ 392.489402][T30299] do_syscall_64+0x65f/0x760 [ 392.493042][T30414] kobject: 'loop4' (000000007ae2652b): kobject_uevent_env [ 392.494004][T30299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.494016][T30299] RIP: 0033:0x7f5c0e01d2b0 [ 392.494038][T30299] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 392.531011][T30299] RSP: 002b:00007ffe0acd4a78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 392.539516][T30299] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f5c0e01d2b0 [ 392.547484][T30299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 392.555454][T30299] RBP: 0000000000000000 R08: 0000000000000028 R09: 0000000001680000 [ 392.563433][T30299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000f2f030 [ 392.568278][T30414] kobject: 'loop4' (000000007ae2652b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 392.571397][T30299] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 392.582808][T30299] Kernel Offset: disabled [ 392.595065][T30299] Rebooting in 86400 seconds..