2c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc800, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 943.246978] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 943.299256] FAT-fs (loop4): Filesystem has been set read-only 02:13:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:13 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8c000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:13 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x50000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:13 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xaa00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc800, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 943.522645] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 943.529871] FAT-fs (loop5): Filesystem has been set read-only 02:13:13 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc800, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:14 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x1400, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:14 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xffffff7f, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc800, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x14, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc800, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xe6e5fa1243000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 944.441770] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:13:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 944.493028] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 944.500265] FAT-fs (loop0): Filesystem has been set read-only [ 944.516946] FAT-fs (loop4): Filesystem has been set read-only 02:13:14 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x5f, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:14 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x1000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x7d, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xff0f, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) [ 944.604880] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 944.635869] FAT-fs (loop5): Filesystem has been set read-only 02:13:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:15 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xff0f, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x6400000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:15 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x91, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:15 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xd2000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x9600000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xe00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 945.478344] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 945.498590] FAT-fs (loop4): Filesystem has been set read-only 02:13:15 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x2a00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:15 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x91, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:16 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc800000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:16 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8c00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 945.851312] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 945.884209] FAT-fs (loop4): Filesystem has been set read-only 02:13:16 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x1400000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x2a00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf0ffffffffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:16 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8c00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:16 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa0000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:16 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x4000000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:16 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8c00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8c00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 946.705450] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:13:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xffffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 946.746400] FAT-fs (loop4): Filesystem has been set read-only 02:13:17 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x2a00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:17 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x64000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:17 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x100000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:17 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf0ffffffffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:17 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xbe000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x60}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 947.355547] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 947.362691] FAT-fs (loop0): Filesystem has been set read-only 02:13:17 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x5a000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:17 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x100000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x30000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:18 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x9100, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x12000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:18 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x30000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x60}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:18 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xcd00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mountinfo\x00') pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 02:13:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:18 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xbe, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000100)={'bond0\x00\x00\x00\x00\x00\x00\x00\xe4@\x01\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x05\vww\f\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 948.463083] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 948.470391] FAT-fs (loop5): Filesystem has been set read-only 02:13:18 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 02:13:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x12}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 948.646891] audit: type=1400 audit(1546222398.941:90): avc: denied { ioctl } for pid=13168 comm="syz-executor5" path="socket:[155430]" dev="sockfs" ino=155430 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 02:13:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x70, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x50, 0x2b, [@IFLA_XDP_FD={0x4c, 0x1, {0x0, 0x0, 0x0, 0x0}}]}]}, 0x70}}, 0x0) 02:13:19 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x1e, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 948.761649] bond0: Releasing backup interface bond_slave_1 02:13:19 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xdc, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) [ 948.838743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 948.850090] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 948.868535] bond0: Error: Device is in use and cannot be enslaved 02:13:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x13000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 948.913320] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 948.931311] bond0: Releasing backup interface bond_slave_1 02:13:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=ANY=[], 0x0}, 0x48) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r3, 0x1, 0x0, 0x20008000) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000000)=0x3) 02:13:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 02:13:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:19 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x73000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:19 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xb9, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x2013, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) r3 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0) setsockopt$sock_int(r3, 0x1, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000380)) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f00000003c0)={0x1e, 0x6}) r4 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r6 = dup2(r5, r4) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000440)={[{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7fff, 0x0, 0x5, 0xfffffffffffffff7}, {0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x7, 0x0, 0x81, 0x9, 0x8, 0x9356777}], 0x40}) r7 = getpgid(0x0) sched_setscheduler(r7, 0x2, &(0x7f0000000100)=0x7) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x7fffffff, 0x7f, 'queue0\x00', 0x10000}) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r3, &(0x7f0000005200)=""/4096) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000006c0), &(0x7f0000000800)=0x4) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:13:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:19 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x3f00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:20 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:20 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x7300, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:20 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xaa00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xffffff80}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:20 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) memfd_create(0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) fcntl$setpipe(r0, 0x407, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000080)=0x96cd, 0x4) write(0xffffffffffffffff, 0x0, 0x0) getpid() ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000003c0)=@get={0x1, 0x0, 0x9aa7}) 02:13:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:20 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa500, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:20 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xf00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 951.027018] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 951.034177] FAT-fs (loop0): Filesystem has been set read-only 02:13:23 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xe000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:23 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 02:13:23 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8c00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x80ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:23 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xf0ffffff0f0000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 02:13:23 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 953.133740] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:13:23 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x69000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xe00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 953.221887] FAT-fs (loop4): Filesystem has been set read-only 02:13:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) openat$ppp(0xffffffffffffff9c, 0x0, 0x1ffffe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x80040, 0x0) perf_event_open(&(0x7f0000000040)={0x200000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000240)) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffc000/0x4000)=nil) r3 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fallocate(r2, 0x11, 0x0, 0x100000001) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 02:13:23 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xd700000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 953.610003] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 953.641610] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 953.648874] FAT-fs (loop0): Filesystem has been set read-only 02:13:23 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xb4, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:23 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x5a00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) [ 953.652518] FAT-fs (loop4): Filesystem has been set read-only 02:13:24 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x4, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x12}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 954.143226] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 954.165790] FAT-fs (loop4): Filesystem has been set read-only 02:13:26 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) openat$ppp(0xffffffffffffff9c, 0x0, 0x1ffffe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x80040, 0x0) perf_event_open(&(0x7f0000000040)={0x200000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000240)) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffc000/0x4000)=nil) r3 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fallocate(r2, 0x11, 0x0, 0x100000001) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 02:13:26 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x9b00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x80ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x80ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:26 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x3c00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:26 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) openat$ppp(0xffffffffffffff9c, 0x0, 0x1ffffe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x80040, 0x0) perf_event_open(&(0x7f0000000040)={0x200000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000240)) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffc000/0x4000)=nil) r3 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fallocate(r2, 0x11, 0x0, 0x100000001) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 02:13:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:26 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xfffffffe, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) [ 956.492596] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 956.499852] FAT-fs (loop0): Filesystem has been set read-only 02:13:26 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x12000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff80}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:13:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:26 executing program 3: 02:13:27 executing program 3: [ 956.754236] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 956.798908] FAT-fs (loop4): Filesystem has been set read-only 02:13:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfcffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x1200}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:29 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:29 executing program 3: 02:13:29 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x10000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x8500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:29 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x3000000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:29 executing program 3: 02:13:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x12000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 959.721861] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:13:30 executing program 3: 02:13:30 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc8000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) [ 959.783093] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 959.790331] FAT-fs (loop0): Filesystem has been set read-only [ 959.794584] FAT-fs (loop4): Filesystem has been set read-only 02:13:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x6000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:32 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:32 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xaa, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:32 executing program 3: 02:13:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:32 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) fcntl$getown(r1, 0x9) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 02:13:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xfffffffffffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:33 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x5, 0x94, 0x4, 0x0, 0xf44, 0x40080, 0xd, 0xd8, 0x8, 0xf0, 0xfffffffffffffffa, 0x0, 0x0, 0x5, 0x9a41, 0xfffffffffffffffb, 0x800, 0x87, 0x3, 0x7, 0x2, 0x3ff, 0x0, 0x4, 0x2, 0x0, 0x5, 0x0, 0x40, 0x0, 0x8, 0x56d, 0x449, 0x4fb, 0x4, 0x0, 0x8000, 0x0, @perf_config_ext={0x0, 0x9}, 0x10010, 0x3f, 0x0, 0x5, 0x20}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(0x0, r0, 0x2, r1, 0x5f90c7e9593bb2c3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) close(r2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffffffffffffff4d) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x500001c) close(r4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x40000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) [ 962.887089] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 962.894261] FAT-fs (loop0): Filesystem has been set read-only 02:13:33 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x9b00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:33 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xfffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0xf000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 963.345737] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 963.352872] FAT-fs (loop0): Filesystem has been set read-only [ 963.440583] audit: type=1804 audit(1546222413.731:91): pid=13644 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir245106332/syzkaller.VxCAtv/1463/memory.events" dev="sda1" ino=17217 res=1 02:13:33 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="02d3550000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:33 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xfeffffff00000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 963.841597] audit: type=1804 audit(1546222414.131:92): pid=13642 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir245106332/syzkaller.VxCAtv/1463/memory.events" dev="sda1" ino=17217 res=1 [ 963.893634] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 963.900809] FAT-fs (loop0): Filesystem has been set read-only [ 964.000901] audit: type=1804 audit(1546222414.171:93): pid=13658 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir245106332/syzkaller.VxCAtv/1463/memory.events" dev="sda1" ino=17217 res=1 [ 964.159554] audit: type=1804 audit(1546222414.171:94): pid=13658 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir245106332/syzkaller.VxCAtv/1463/memory.events" dev="sda1" ino=17217 res=1 02:13:34 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x40000) 02:13:34 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xd2, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 964.386790] audit: type=1804 audit(1546222414.681:95): pid=13714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir245106332/syzkaller.VxCAtv/1464/memory.events" dev="sda1" ino=17220 res=1 [ 964.522299] audit: type=1804 audit(1546222414.811:96): pid=13714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir245106332/syzkaller.VxCAtv/1464/memory.events" dev="sda1" ino=17220 res=1 [ 964.566948] audit: type=1804 audit(1546222414.811:97): pid=13716 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir245106332/syzkaller.VxCAtv/1464/memory.events" dev="sda1" ino=17220 res=1 02:13:36 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1601000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000000c0)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x1, 0x8}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:13:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xc8b) 02:13:36 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xbe00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe6e5fa1243000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:36 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x200000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 966.770256] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 966.777470] FAT-fs (loop0): Filesystem has been set read-only 02:13:39 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:39 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xffffff7f00000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:39 executing program 3: seccomp(0x0, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r1, &(0x7f00000000c0)={0xb, 0x29, 0x1}, 0xb) utime(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) r2 = syz_open_procfs(0x0, 0x0) recvmsg(r2, 0x0, 0x20) prctl$PR_SET_THP_DISABLE(0x29, 0x0) add_key$user(&(0x7f0000001580)='user\x00', &(0x7f00000015c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) sendmsg$nl_route_sched(r2, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40080c5}, 0x40) getegid() getgid() getgid() fstat(r0, &(0x7f00000017c0)) getegid() setgroups(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000001b40)='./file0\x00', 0x0, 0x0, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001cc0)) 02:13:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x13}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:39 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000800000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000580)=""/224) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) [ 969.163194] audit: type=1326 audit(1546222419.451:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13790 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x0 02:13:39 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:39 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x4600000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x85}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:39 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x85000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 969.967424] audit: type=1326 audit(1546222420.261:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13790 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x0 02:13:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 02:13:40 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:40 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa000000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:40 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x3, 0xc7450b2}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r3, 0x5}, &(0x7f0000000440)=0x8) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:40 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x3, 0x4, 0x10000, 0x5}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x46) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) shutdown(0xffffffffffffffff, 0x0) 02:13:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:40 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xb4000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:40 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@ng, 0x2, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x0, 0x4, 0x10000, 0x5}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x46) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) listen(0xffffffffffffffff, 0x80001000) readv(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {&(0x7f00000008c0)=""/96, 0x60}, {0x0}, {0x0}, {&(0x7f0000000ac0)=""/35, 0x23}], 0x5) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) shutdown(0xffffffffffffffff, 0x0) 02:13:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:43 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:43 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@ng, 0x2, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x0, 0x4, 0x10000, 0x5}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x46) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) listen(0xffffffffffffffff, 0x80001000) readv(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {&(0x7f00000008c0)=""/96, 0x60}, {0x0}, {0x0}, {&(0x7f0000000ac0)=""/35, 0x23}], 0x5) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) shutdown(0xffffffffffffffff, 0x0) 02:13:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:43 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc3000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:13:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:43 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x0) socket$inet6(0xa, 0x2, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x4d6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040), 0x21c}], 0x8) 02:13:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:43 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8000000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:46 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000680)=""/226) 02:13:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1200}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:46 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x2a000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x42, 0x80000080004) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000004c788ea1c7f786b0bbec16831c30916e341031e0a260baf0263fe7134d4c021296a3d7fe56c9298185b9925dd425655373ff53511de2c6f7c68eba922fbbb8523aedaa39c2c4fec6d168ed33808d07cff31eac62ecbd50410ce905130ea96f5819b2500219807f09e1d2a46886028c2ff9d0d726932cbca8d3ecae1890619c73d3ad69c0c6205d38e65a024d66f72b1924510907355d7b5306b868a9a90acb3e606a1f8241aa0e7e46617a41fee6675498de7297b53a9a9fded944dfca56c163a9c21f6b47aaef9e5398cf79"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f00000000c0)={0x1, 0x9}) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0xd) 02:13:46 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:46 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x400000000200003, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 02:13:47 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xfffffffe, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:47 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x80ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\xfa') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000380)) 02:13:47 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 976.841908] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 976.857157] FAT-fs (loop4): Filesystem has been set read-only [ 976.863681] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:13:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x12}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:47 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="008aff5fc900000000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000012000/0x1000)=nil, &(0x7f0000011000/0x4000)=nil, 0x1000, 0x1}) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) acct(&(0x7f00000001c0)='./file0\x00') setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000000240)=[{0x42, 0x4, 0x8, 0x9}]}, 0x10) rmdir(&(0x7f0000000180)='./file0\x00') accept4(r1, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x1) write$P9_RGETLOCK(r0, 0x0, 0x0) 02:13:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) openat$ppp(0xffffffffffffff9c, 0x0, 0x1ffffe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x80040, 0x0) perf_event_open(&(0x7f0000000040)={0x200000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000240)) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffc000/0x4000)=nil) r3 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fallocate(r2, 0x11, 0x0, 0x100000001) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 02:13:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:47 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc300000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_emit_ethernet(0x0, 0x0, 0x0) 02:13:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffffc}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 977.676295] audit: type=1326 audit(1546222427.971:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14096 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 02:13:48 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x6000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 977.730455] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 977.737725] FAT-fs (loop0): Filesystem has been set read-only [ 978.052435] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 978.059738] FAT-fs (loop0): Filesystem has been set read-only [ 978.410869] audit: type=1326 audit(1546222428.701:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14096 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 02:13:50 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x13}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x13000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:50 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x64, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:50 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10001f0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:13:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x2008200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x8, 0x0, 0x10000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:13:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4312fae5e6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfcffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:50 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x2000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:53 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:53 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:53 executing program 3: socketpair$unix(0x1, 0x8000000002, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x531) close(r0) 02:13:53 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xfffffffffffffffd) 02:13:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfcffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 983.244755] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 983.251973] FAT-fs (loop0): Filesystem has been set read-only 02:13:53 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x7d00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff80}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 983.722813] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 983.730347] FAT-fs (loop0): Filesystem has been set read-only 02:13:56 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfeffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:56 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffffc}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:56 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="10ed1e8f0c"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000d, 0x810, r0, 0x33) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xe64, 0x1, 0x8001, 0x0, 0x5, 0x6, 0xb1, 0x7940, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r3, 0x7fff}, &(0x7f0000000440)=0x8) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:56 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x116}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:56 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:56 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa00, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 986.698635] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 986.706031] FAT-fs (loop0): Filesystem has been set read-only 02:13:59 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:13:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3d2976bc97}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:59 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x64, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:59 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa500, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xc913af150b36f045, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000240)={0xe, 0x17, 0x2, {0x5, './bus'}}, 0xe) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r0, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(r1, 0x0, 0xffffffffffffffe0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x80ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:59 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xc000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:59 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xe1, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:13:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:13:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:02 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:02 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x6000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x13000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:02 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x8200000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:02 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r2}) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:02 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x6000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:02 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x400000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3f00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 992.858566] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 992.885135] FAT-fs (loop4): Filesystem has been set read-only [ 992.901075] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 992.990526] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 992.997726] FAT-fs (loop0): Filesystem has been set read-only 02:14:05 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:05 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:05 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x5000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:05 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x4, 0x1, 0x5}, 0x9a7b}}, 0x18) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:05 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:05 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:06 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 02:14:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x80ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:06 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r2}) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:06 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x24, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:06 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 02:14:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="d60fdf751207d8344144501ce70100a33b990077c7e8a571125fbf62f346ac4820cbb5722e0dcb01eeb2dd92586374370cbeff5564069263e20e835d2f8986feba9cb8aa5ef609da08f7b1eeb91d09655f16c6dda2d981f6cf020000000000000014dbe9d313656875d8b13b5e203a8e9b70108d8ae166162231f019b407ece9c6d0e97f"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000480)='./bus/file0\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x6) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:06 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 02:14:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x12000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:07 executing program 5: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:07 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x3600, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3f00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 996.828934] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 996.836190] FAT-fs (loop0): Filesystem has been set read-only [ 997.303414] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 997.310661] FAT-fs (loop0): Filesystem has been set read-only 02:14:07 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x400000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:07 executing program 5: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:08 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:08 executing program 5: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:08 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/40) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000580)) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) r4 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r4, &(0x7f00000003c0), 0x4) unlinkat(r2, &(0x7f0000000240)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x63, &(0x7f0000000400)={'NETMAP\x00'}, &(0x7f0000000480)=0x1e) 02:14:08 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x400000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x97bc76293d000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:08 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:08 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x400000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:08 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="96884f8deddb6c811a74789690a1187a388162a283f142c48d5e81b07e39436b6104dd3af64e4b7efdf921f90571e5dc180f05373c3798bc39d15d2832d5da15795636b1670c830df7f9ee728189c74f6dbe5639fb7451db395ebd1f"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/7) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:09 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000240)=[{{r2, r3/1000+10000}, 0x15, 0x9, 0x1}, {{}, 0x17, 0x2e, 0x1ff}], 0x30) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(r1, 0x4b32, 0x8) sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r5, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept$alg(r5, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x1ff, 0x101, 0x4, 0x0, 0x0, 0x10080, 0x7, 0x97c, 0x401, 0x7, 0x7, 0x7ff, 0xffff, 0xe10b6a0, 0x5, 0xfffffffffffffffd, 0x9, 0x0, 0x80, 0x81, 0x2, 0xb2a, 0x20cf, 0x2, 0x1ff, 0xe79, 0x2, 0xb0, 0x6, 0x101, 0x3, 0xfff, 0x8, 0xced, 0x9a, 0x0, 0xffffffffffff8001, 0x4, @perf_config_ext={0x9, 0x62d3}, 0x4, 0x6, 0x8, 0x7, 0x5, 0x4, 0x9}, r6, 0x1, r1, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) 02:14:09 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000800000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000580)=""/224) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:09 executing program 0: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000580)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000003c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xffffff2a, 0x4}], 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="10ed1e0000f6671186f628b3cb3b3b48d60d912016597c3846260cca8de1e5088ce8fa0eae16b1179bcb0fae6544a31cf28f7e40e3a6af366eaafaf8ec0eca5bf5bbc941e7979617312dbd4508a79d7f20cd44222cee35234545ff1d71440195419746f9129181deba32e9c88ed05207d57a54d78bb902551ef3dbc830df7afbb224c6610dac1f78a1300178a0035b19032b8fc610880000000000000000000000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(r0, 0x4b32, 0x400000008) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000005c0)={@null=' \x00', 0xf, 'bridge0\x00'}) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x1ff, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000140)=""/31) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:09 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x40000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:09 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3f00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:10 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 999.945790] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 999.983772] FAT-fs (loop4): Filesystem has been set read-only [ 1000.025050] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:10 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000000c0)=0x1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="89f92e547bd377154f23fdbf507df610ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000001c0)) 02:14:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:10 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:10 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) fcntl$getown(r1, 0x9) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x60}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:10 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:10 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) ioctl$FICLONE(r0, 0x40049409, r0) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:10 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x12}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffffffffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:11 executing program 3: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000580)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000003c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xffffff2a, 0x4}], 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="10ed1e0000f6671186f628b3cb3b3b48d60d912016597c3846260cca8de1e5088ce8fa0eae16b1179bcb0fae6544a31cf28f7e40e3a6af366eaafaf8ec0eca5bf5bbc941e7979617312dbd4508a79d7f20cd44222cee35234545ff1d71440195419746f9129181deba32e9c88ed05207d57a54d78bb902551ef3dbc830df7afbb224c6610dac1f78a1300178a0035b19032b8fc610880000000000000000000000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(r0, 0x4b32, 0x400000008) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000005c0)={@null=' \x00', 0xf, 'bridge0\x00'}) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x1ff, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000140)=""/31) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:11 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@remote, 0x0, r4}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 02:14:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:11 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="10ed1e00b961e58f00"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') memfd_create(&(0x7f00000003c0)='vfat\x00', 0x3) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000)=0x3, 0x9) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0xfffffffffffffff5, 0x5, {0x0, 0x5}}, 0x20) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffd53, 0x0, 0x0, {0x200007}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0xac, r5, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa08}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1b8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffff}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x74b}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20008000}, 0x40010) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:14 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffffffffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:14 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000480)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="821c0219ae1bc824"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000240), &(0x7f00000003c0)=0x4) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(r2, 0x4b32, 0x7) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) getpid() r5 = socket(0xa, 0x2, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000780)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000200)={@empty, r7}, 0x14) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = pkey_alloc(0x0, 0xf7ffffdffffffffc) pkey_free(r9) r10 = dup3(r8, 0xffffffffffffffff, 0x0) futimesat(r10, &(0x7f0000000240)='./file0\x00', 0x0) gettid() syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xc0, 0x80) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) 02:14:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="10ed1e00b961e58f00"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') memfd_create(&(0x7f00000003c0)='vfat\x00', 0x3) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000)=0x3, 0x9) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0xfffffffffffffff5, 0x5, {0x0, 0x5}}, 0x20) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffd53, 0x0, 0x0, {0x200007}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0xac, r5, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa08}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1b8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffff}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x74b}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20008000}, 0x40010) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:14 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00B'], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:14 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="10ed1e00b961e58f00"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') memfd_create(&(0x7f00000003c0)='vfat\x00', 0x3) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000)=0x3, 0x9) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0xfffffffffffffff5, 0x5, {0x0, 0x5}}, 0x20) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffd53, 0x0, 0x0, {0x200007}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0xac, r5, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa08}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1b8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffff}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x74b}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20008000}, 0x40010) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1004.272550] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1004.282819] FAT-fs (loop4): Filesystem has been set read-only 02:14:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1004.318331] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="10ed1e00b961e58f00"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') memfd_create(&(0x7f00000003c0)='vfat\x00', 0x3) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000)=0x3, 0x9) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0xfffffffffffffff5, 0x5, {0x0, 0x5}}, 0x20) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffd53, 0x0, 0x0, {0x200007}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0xac, r5, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa08}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1b8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffff}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x74b}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20008000}, 0x40010) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:15 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e939a"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x3f) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) r5 = creat(&(0x7f0000000100)='./file1\x00', 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x7a0, 0x4, [0xfffffffffffffff9, 0x6, 0xfffffffffffffffb, 0x200]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={r6, 0x2}, 0x8) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) 02:14:15 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:15 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x9b00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 1005.319342] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1005.327727] FAT-fs (loop4): Filesystem has been set read-only [ 1005.334434] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:17 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:17 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x9b00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="7fe91e0004"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000004580)={0xc000000000000000, 0x4, 0x7fffffff, 0x2, 0x19}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r3, &(0x7f0000004600), 0x8080ffeffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x4, 0x1, 0xb8, 0x81, 0xfffffffffffffff7, 0x1f}) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmmsg(r4, &(0x7f0000004440)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x3, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0x40}, 0x7}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000580)="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", 0xfb}, {&(0x7f0000000680)="76d467563851cf7ba1654283a103d918728d07f71256f254b0b848bf70742d6116e2637e70dafdc86d8d10948d3255749c7ec31dbd2e594e6dd3329f467a9caa472a9caba6da1fc7e562ae474d87cbeee378a6aae87240aa03dac51fad69fe5742c638ac0574d04c696b4749ea6740694dafaa674d5a4d06b0e82e39fe1438dd3515795538b691cccb", 0x89}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000740)="a53d0bf24cc65a5a76e5d57b2954295a6ddf8f16c18a8566ff4c9400ba25c26ceac69da793530ed4b411441eb65ef20ce5b910d8498a93bfcdbc94d245941d2607fa409a575db2fb86832f76c6589ac5eb8a979cecc9a701b2ac26f0b23619fc054920ce9c901382eab6c3f0", 0x6c}, {&(0x7f0000001880)="d2367eaa3ec215eaf2368f3660bd75876dfa9dfb622c2e54c5045ecb003c2f885251e9a76d2d98d5fb476f1a44d7c41d32f2513bbadc3292e2bca82cdd8518b1be1667b3fa5958e2c77ad1ceb4ee3960ea83c9c96ed2a5d9e77042a51e463258fcc845178aaa6aeb60709667c8e41d6bd4c2ad5932a06edaf16bd5cabfc724ac4a76b4e8e010c9b2d09ee6bf812dc7c60a65657388f2342aee7e9e5df22bd6fc79d7a3b1bd7c6e44c50e5629fa60f5873895a1ad29335e886a7c308b6ce5e8f2fd4dae904e1c99eb273fa9722e45edb30fcd6d23396788d0cc65108dd09c256b211bb8f47581591960255d52a0601ad0cb553e7eb1a113e2c5", 0xf9}], 0x5, &(0x7f0000001a00)=[{0x88, 0x10d, 0x800000000000000, "03c345caa7b763570625fcc5c530a2e9d51d555038534ab9b25dbebd5d7d89eb34356afd4d7a3b67935e3f6bd9804c3ac0bf9f6deac2b1163316b53889636242c45f6da9fd3b5cbf98c2cf9bf4324ed8832996f07550098ca87fb31d24a1dc418eb0a347221f5ae9a7ac009ebd00e9e0b089ca5a"}, {0x18, 0x10b, 0x401, "434d5f26e1"}, {0x110, 0x3a, 0x8, "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"}, {0xa8, 0x0, 0x7ff, "7535481d62c0e2a5fd2b440b33cf92ded5d793e84f00676af87d406301a309731a12c62d6ee5ee729ae5aee6ee8f0b05774a6c99a3f60bff11246cf338eb979dec0de0415520f9c2e49299b27ccc384d7dbcad8e20f0e182ff25488c234a2a5969b311e426ae80a0c3e76ff539717bc20bde580e889ec491f5139e2fdded23072858a135f3a3fdc309c8f87627e8dca992b6345065ce20"}], 0x258}, 0x7}, {{&(0x7f0000001c80)=@ll={0x11, 0xf5, r5, 0x1, 0x400, 0x6, @dev={[], 0x15}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001d00)="3211ea103d52f779354e13b83a07c6c252c8faa1be0bc2a7b0b67062e861405dd6649b170a58fe5ab213060b12baf4ae83ccbcf0ef39b864cff9d2acea3001c8a231b0205924", 0x46}, {&(0x7f0000001d80)="562f3804e312950ebb2827c1348184d81e87558bb10df0dda9f9a820888621fef31ac71264ea6ecfcf2223af09ac5a31efc134d279f6adfb4e4d714b4dd8114a64320f16484133a352383bd82fe4701e4717f73a071d", 0x56}, {&(0x7f0000000500)="1d44e0ba3d9a9cf6080c768ce738d8d0e8e1f1e1946a2619d572e1df3f", 0x1d}, {&(0x7f00000007c0)="322a84641a30637cff899df97ce5e9a89d3a17", 0x13}, {&(0x7f0000001e40)="0034e398e4ef08fa4fa710ef77a6686d5360d6bbb5e8a55524c6b899463df896c0635e7bbab019c3b8f95973ee3423ff9c0e61f1bdde240d10519732f3397b923e7e5f2ab680571fb1c26e649159f01821026a645bfe7d50d5e6d3fec33aade69bd90531063eee753181", 0x6a}, {&(0x7f0000001ec0)="41ddbc23865826913cfa9eaeef2939701af630f4e893723a9694f1ba9323e2b116997e42dd482b376cfe8657be49535800ff3193aac669e1409b7d6a001eeef1502790f9c725b9ac37b8e598bd3ac7adf7486fa8bf997a2c790823d8a17e7c460cfe774ef41fabdf8908840d6f9a5da7e25d470db608cf39e472d6aa72b597c7e0709f709d63420c84d64b9655379f1ebc50b1cd5089e0cbf21a75a7ce3b36", 0x9f}, {&(0x7f0000001f80)="20b87df1902604dfea7c4fcc597c9af092c6bd14e7a0dc9726f6e7ad288e80af7459cc41b689424fdd55ae0cf7a2cb214707c4670327b18121d119198fa81a22573bd035937b1c4f78450642a19f1d1a408fb60c12cdd56eb2c273539402cf85d39a313f760fa37d05bce278e3979602420c2d6d2d3804832caf98ff678b68932c7e07a0ce7a0159e7bab535e1ed74bd4a34b33f318d77c9d4ebf2d654ab565bb2459ab6d823d5ef1e4a27f00e27a9b4f789cb7310eaaeff5b1749de94ebe8de9ec5d8f79e5e3e0e16", 0xc9}], 0x7, &(0x7f0000002100)=[{0xf8, 0x11f, 0x54b, "2d035c3a287e1a33245342a6cd9664a0743aa18f32d135bb0331d29ae3c682edf7cd9a15005f9f280c25bdc8e0091366d205e868cf742b9843a856079993ad13ba358d89cfca8b7488146ff6dec89f0923ead58d2e3f2396c8d993f088d9905bbcfb85c3074e04fca3966bca6e54318c9085228c1f681a8383169f2055f5ba48078a6ea16672c1fb722b92797a0c9ad2fa664636f8acf927286636ff15556617bb969e506d1f2a0c5c12947d46caf3a107fbd1abdd32574fd2200baa2919c63bde8cde4c9f189a2f0ac89fbbbff19a8f593df68c4bccbc17124b20a0fdcc904f0566d87de1"}], 0xf8}, 0x3}, {{&(0x7f0000002200)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x12000000000, 0x5b25, "5f970700915f5bcea2be42c5bc87b5c7043468b4eb7e6d74e9ca90d4aa747935677659af7b8c183130fe5e475c501f654954dd877b54b5a0c8b5c6a2f73b8f", 0x26}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002280)="76907f7ac35b73f0714ba76d136fe92827f74cac6dc9d54ce719f717193e3905a541c556b13da07daf8f1f626d93eeedae7155399a512cb54e129d9299217926a39a1a816ebf1378af353b7706bbe50c0cf73139029d63b77146db8e7de3ad97d6730dc35e36a2e071ae739e4b6511eccab9e4551f1c9458b1e5709ebd8b120f53f469152cd727cbc2db5f9418070318e1642652477206ea0f2909d011fc464aa90eb8420e97da2828c532", 0xab}, {&(0x7f0000002340)="7ddfe4d1ee14947a86f4108ef8e0305fc37acc06c71798a431bdd9b5354aecece632d3e3316abe8effdcc4d62c6ccf00136e68965c57d42d4e514ddaca274810ff27870d18b03ddf292632d8412f85f6bcde5ddc6993cd3c6bc2add229c329058d78101605ba1c528d44262d4fd83fad52b0ab14ef1a4683ca35ec10261dd4e21e43180b13ca3f190d14a848d2c7b9752c829ac12c8ac72321f741c39bb2028f0041c6adbe0557fcee529b46fe150af743be9c68b42dbfc5a4b1bc6eea72f9475101c8620493e5eb560afbf431893d6bbb07a713c06ec4c183061aad589b3036051ea926efd05c63d0d3", 0xea}, {&(0x7f0000002440)="c6cb171d", 0x4}, {&(0x7f0000002480)="1fbcf097e025151b861b648f43113d4a15b314b9750c7f7797539a851397a520b07af3e1199e8f4099c17feb1eb5145b5f050e24effd79f0c8806b8deab2c223e997433c6ff1e110ba791b1a4196bd1778752a5c86998383cefaeff213e3a1de585e83f1be2aa74933b5002a6f164e1ac2c92ad43dfd2208a1cb826cca4900c5de0aee850679c393a238a2cf82fd24244a5690a03245c10441571b33297b9338715c1e1ca088695de89b7c7f1723be2a322dcd0bb5c0fbb1abfb72e53a76d245278160caec5f9e42b31284f31f6bb5e91421f795128ccbb38504b0334cf6438db8b6d0856805991a579f1d2c586979fc4d5ac0f176d119b8", 0xf8}, {&(0x7f0000002580)="aa5da9b9c3a75e8f6fdb800900600a82b0242950b032225a534f516cf0a903ff122619854b0d74eab69ae6baf315e2b9ab72de508976cf978739cb84ffde564c92fa72a97e718cdc35f0b2d9d985e0886ea5cb17e975300a49277f1bebe1cc756264eba57659860c0484af5eb612a9e56dd1f7b490f2edd80ae6cfb99f296414c4a43b1c16315b6e5c9116b257528eb8689e9e2d31309d98ee61ca4ff0007238b63eeb93817c1e83dff180208c2b89671b5bb089abe8ae3c4842d260aa", 0xbd}, {&(0x7f0000002640)="385d750028be006a38cd62932475d401ff5d4b8dd70043d3ed0f138ced1bf3bfd7a4ca7fa4045aa5c2cafe9cf1d159e6cf7665025658f7cfde9a114e6ce1101449aff32ba586147ee2e8b895b56a4381beec235677c9fe5a7dc176c607156b01c66ec09205def1e8ff040bc05762a34a5014ee7b89def35f40c195dbec7d534d74b319f211f83a901a8e5479dd9b0e8d52b0", 0x92}], 0x6, &(0x7f0000002780)=[{0x108, 0x0, 0x8000, "a5c724c437a665c8eb6f3c9aa107465bb874a135bb296d4082110426f609ac2ff9057618640be5cef2a9750f5261a9503379b9977c1b40805e5a0b077bd8bd1ba21b61c116c973da08e042db0a691c8c7a4dfc030cf7a77b0a797403ee871b7b7afefd8ee1096ca0fb73e91c945f8d98014fac8fc3f1e9d4a835f06b34f0f740cb485d116ce1efc8da66d2a72f25bec342d4c8efc9fb94fad7078c03de49ed8d0f4a0a9d74b377137066036f36085e902c6d6d1e5ed3531f34a2e46940b0dc28bc34be697ef929c946dd60b97a19995f213124aaa626d686fb8bd0bf455c13d69747577c343faf79c8465bb0328c9a7fa6de2c153f6cb92b"}, {0x80, 0x115, 0x3ff, "6840f6dd3cca2e12b5fce822011cce18d4f75900b9183ddc2d43a4065981d2f9ed43301424da69ccf73bd8c357a1d756008e34a26d08bd2e75eda8ad3b4ba523380808f875701034e58c5b602cc06d324b3747d4bc0187fb2ebcd6de7ef166f3725c9204abffb9d82b15"}, {0x88, 0x13e, 0x1, "86ca2d8945f974523d3d6bc2c11e5f4666bee847bec3a860df6a768f410979dd2aa4b6c2a7a15e75012e684a6ce87f73ec5828182f67b008e8c0d4b68622efc05643c7aefca59b97eea16e95dc5e3d8ced973608de15b1db8507c29569c1cd17d85a6a4dd56ed97003ecb1c9ae01cb9851f928c2909e"}], 0x210}, 0x5}, {{&(0x7f00000029c0)=@sco={0x1f, {0xe3e0, 0x8, 0xef7, 0x9, 0xfffffffffffff000, 0x8f85}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)="6fdd601db3e842ffbe23fd338fe6ef576e704d83cb378f54e57044b9748f26370bbbc968f9c8c5bcfc5c360b10fc36ffecef3ebb86d6f7a57f26ab1186dd5405f4e53269f19c0fc02c3d219c35033297f2939bae9bcad386bd04dfce34c1c6658fc38a1798669ed420fcd97feaef49a7ccf7d5e7de019fbda072c664207bde4a7c412b8c59b4e381bd6c80c02bc32dd9c2fd317441136389ed615b169f4be32b06e64fb5c0f2c2eb34405f5c0e893d9ce69b303286c633e6c2dd026bf9d6567d24e3182e76588aa77eaa01997393311b45ccdc7bc443fca3a0ddfd060b7d2c522d579abe614d4080f4", 0xe9}], 0x1, &(0x7f0000002b80)=[{0x38, 0x19e, 0xd, "0c4b6378d0db5b0898385efb6f3264c70b1b93880744896f3d8b8ee2428fa3bd879fc5ed"}, {0x58, 0x105, 0x0, "0e0ecd1538d108d4b2f4cda8a469f0da69b521fb56577eb26412c1d391dba8f9a9de71d40cba29c3f25627fd086a65413b5cb369eb80dfdeb0eeadef89fb1ba7f819683de5"}, {0x1010, 0x117, 0x1ff, "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"}, {0x48, 0x119, 0x1, "3cd7e84b4a08ee195a4a4070a700c21f89a604941ada833251bcc420395bd9c6ed09d0ee280eaced1971a7d389b94cc493"}, {0x30, 0x100, 0x4, "9570c29bafbd2635ebd764435f240d7ed0e806bc361a35416998ad20711a743e"}, {0xa0, 0x114, 0x6, "098354bc51abb412eb8396daad4c3ddf90140917cdcd7f30aff32c4650c0d90a6cf1077781779703e83e4254349ca2d0db72ac871624e5b19e25e6cd2c18916f8260c0dc689240149090ff8100369f47bea66f478c25f637d42fa2a9c3973f1c048e474cfb657bc4897aa25df17ad6f397f688b676bd1e6d09f37425660e4588e05dea0963f1972da12e44"}], 0x11b8}, 0x101}, {{&(0x7f0000003d40)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003dc0)="23ce5c64edbaf6dfa974b15f2d5574d9806044c48add55631a2bde21a7ca5ac2e60cd02c461df19cf7855b4e11f786a65b0bc8c561e644b84f5b38dc47883ee723e50c9423bd777c7905d0ccf290640ec866ba73749775410cb10033fb8a22a9", 0x60}, {&(0x7f0000003e40)="c1fe07bcd1e9e16efdab3a1c3d4944a060c504a77938d23cc3f8b621daa5931f7d562a67704d3a4889ae52df1a6c3e05d4958a4fa1548649301608bee2528ef3b4c94396d7966d5a4368ac85c317bb6286ec7c70e21725b3d97213ee25a15df1470c9f50a64f42d4c27a3dbd3cbe1e2a2d9125f0c5215fdfe4210b4c338919cbc20845d146", 0x85}], 0x2, &(0x7f0000003f40)=[{0x50, 0x105, 0x8, "a514827fbb03559f7d8943177081bdc2d07096b3a2473f01d85760f26f64945f6f233ea4a36e33c76013323e42d26a58d3b0ed0f8e7702440a631ec5"}, {0x98, 0x1, 0x7fffffff, "3542dc0d707f2c86e79ab5dc3b7ea8e55f82bc850362e821cb5210eeb35361501bd4e1a9bf5908d7617336b7fee810461a0d7fbc7466c315bf1cd7ceaadbb9cf960b582836aff117291a12c83aaaa1c679985daf76fb3b03e11805e88ea53911adcc0e76ec983d260c91cca584e2be1ff7518822332038b357d6ded2c6dc2176dd9825fe317829a7"}, {0xa0, 0x118, 0x0, "e1bba5d20ce57453ef107f5aaec6c9f1be34d3c1066970e55a8d68f13b5290a82271193bb7f1a9d671ead71fc41f23ba7ef69be274a03b2614b91e03c1fc0ec516680da755ed657a332ef2bf4ccd492452c56e33ed0e01cc14b87b97052a4f1789f05cafdc5dcdf916fc5417585f2f13c7105cce7a539944be634ea3950877aef1ad3a48ff2c79cca79b"}, {0x60, 0x10e, 0x5, "0f8648ef982705c17d7149ba291f9dcd613fc89ad22ac732ede46841a28036ef5bdd0e73c62f3608e18e92fe844178b679105fcb1795e37d0d01d644d25c08d0279e908262947606043d311c3f"}, {0x48, 0x10d, 0x9, "e2f11b8173312128a5f9b25f93b0bca74a1f2217b5634876188a6de9c340628e5bbaaf7e0465864fc4506310dcc33d4bc7e35d19a80b"}, {0x70, 0x1ff, 0xbd6, "4f8a74ff0cf081353fad085731632ccca97e96b1fd69601cab092bdfd2dc330ffdeab8c6ffef628cb6218370c781c60b066010e498607f34f29235185a7b27359c4a13092872e4a39f3fc73e14793676936f96f36c0a1f671cc3"}, {0x108, 0x112, 0x3, "0bd09c0f804ae3e573e58d4ede8c0d661ebc32c4ec92065acc2191a487fcfb8af6a1112dd829492d0b3c51032de27ba58b3a8f6eb28713b76b4abe9b037eb0c85f512eec9a4ac07b4200ca87daa6ba7ed322378d43d6c3e492dae5e6f075482ab423d05b05f6c27cfcfe9b3de897e53e65168a2d3d8b7677e02b7a3fec12398d42a47fb1fdeb0355d5520c2d7a60c252a66968f86a69775c75b06b9095a36898e626699944696d34a873d97c83abadb364c65f0806892ace0ffc52cadbf6c059e38528466728229599bfbdf0b98f8ad2e464b57cc7a0dd1f8d4ab7c93b34d1ea01d1648f7ffa2753ac0bd0580d634ec0191bbb158a17e703"}, {0xb0, 0x11f, 0x75, "52d7a824d30984e5704bd03d72092fb3bc0ae0144cc0fb751f89467d67290c851c381a94e3acd7e8c39a28292d40a18c3b50181389b0f5f8257f4ed1002aa8bfe3f9af493dc7b0f4d81ed68840bbcdb230ebe730ac65078d5a6a27266bdb84620423a00f0f13158cf4ec6b2d30bdf46ae166dce068cdd4994224fef46cc27e586fbd79c42d8bf00752034ac993ce8163d62950ffd768927a45f9eb5bffe07d60"}, {0xa0, 0x3a, 0x5, "2d774b7a4c5f4f2ae70a9eab51a765c35910c4aed449f126b2b513510f4ac6cc4968a8f684dd4418c322770854da35f44079b91268c17ca7f3c3f5ad0e6787f590eb3e94ac49a4065b5bcc0d703f424f5b691de1494a300047708b3b08e2c928f14fa8b4b4595caf50c160ead2f9e672266c53ae398af5bec36bf0f8e5217aaa121b7c95c2a534bbb883"}], 0x4f8}, 0x6}], 0x5, 0x40) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:17 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:17 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1007.265589] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1007.301304] FAT-fs (loop4): Filesystem has been set read-only 02:14:17 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x2000000000000040) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1e00000000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) r4 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) r7 = geteuid() sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="b40400001e0027072cbd7000fcdbdf25070000003a25b4756c669ec84dde51ef457e4753ac4c592f50463e833a5bfa439eedabe2306edd72e73789675d46f48ef18fd455abc855bd7e83de0679c0d405a15762f247b0584782cb22674b94eb67f16e5978cb494e191aa00951ebbdb65d9cefed0d31cdc7d5ad88fea0c2e3e7f2df399116a4e86eb00413c6e77c5e263b77a0ecf1d76b7457caf857ca286f02015bdd1725456044c192fac3921bfc1c080020007f00000116353888a44d069cbfe33a4bc4df0e3d8e49e382cd51c64bf1d419e90482d4f81e7051077f8f7782d7b0b0e311c2c654febf25eac3610dc7df5056c1406d158eaf5dc2e29720daf9a89da346777be6a9e2112d9fa0286f13622a03602ac4c848386f5883f9e1eee5045eb97e2433e52acc533de6a3f39047da222daf3058a14616eccdd6403d8948aac3adcf90547006715e767a0c00420070726f632a285c001400720008008000", @ANYRES32=r4, @ANYBLOB="18008a00414d000008001700", @ANYRES32=r5, @ANYBLOB="80010900e28f6939b6d44bb49197ae28118cfc57b232b668836e067d623cdb9a699f0d302bb6b3328ef2edd2418300142c6667c1d23fba7c1e6b35b081d8cb3591a77cabff2d33057e0902c0378acbc1e286a2b67794276e454939202683b47c1be43dc1ed048bbff3341c0f5987a347c968ada9b873ed288c82952ff4dd9fc13e801ce29125d1ea32afdd8e5c99006b288289137a4b678e36051529266e1e850a08007100", @ANYRES32=r6, @ANYBLOB="1c00570076626f786e6574307573657240747275737465640000000008000300", @ANYRES32=r7, @ANYBLOB="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"], 0x4b4}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 02:14:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1007.742256] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3f00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1007.790117] FAT-fs (loop0): Filesystem has been set read-only [ 1007.805172] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:18 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x800) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) socket(0x8, 0x3, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:18 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="7fe91e0004"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000004580)={0xc000000000000000, 0x4, 0x7fffffff, 0x2, 0x19}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r3, &(0x7f0000004600), 0x8080ffeffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x4, 0x1, 0xb8, 0x81, 0xfffffffffffffff7, 0x1f}) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmmsg(r4, &(0x7f0000004440)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x3, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0x40}, 0x7}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000580)="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", 0xfb}, {&(0x7f0000000680)="76d467563851cf7ba1654283a103d918728d07f71256f254b0b848bf70742d6116e2637e70dafdc86d8d10948d3255749c7ec31dbd2e594e6dd3329f467a9caa472a9caba6da1fc7e562ae474d87cbeee378a6aae87240aa03dac51fad69fe5742c638ac0574d04c696b4749ea6740694dafaa674d5a4d06b0e82e39fe1438dd3515795538b691cccb", 0x89}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000740)="a53d0bf24cc65a5a76e5d57b2954295a6ddf8f16c18a8566ff4c9400ba25c26ceac69da793530ed4b411441eb65ef20ce5b910d8498a93bfcdbc94d245941d2607fa409a575db2fb86832f76c6589ac5eb8a979cecc9a701b2ac26f0b23619fc054920ce9c901382eab6c3f0", 0x6c}, {&(0x7f0000001880)="d2367eaa3ec215eaf2368f3660bd75876dfa9dfb622c2e54c5045ecb003c2f885251e9a76d2d98d5fb476f1a44d7c41d32f2513bbadc3292e2bca82cdd8518b1be1667b3fa5958e2c77ad1ceb4ee3960ea83c9c96ed2a5d9e77042a51e463258fcc845178aaa6aeb60709667c8e41d6bd4c2ad5932a06edaf16bd5cabfc724ac4a76b4e8e010c9b2d09ee6bf812dc7c60a65657388f2342aee7e9e5df22bd6fc79d7a3b1bd7c6e44c50e5629fa60f5873895a1ad29335e886a7c308b6ce5e8f2fd4dae904e1c99eb273fa9722e45edb30fcd6d23396788d0cc65108dd09c256b211bb8f47581591960255d52a0601ad0cb553e7eb1a113e2c5", 0xf9}], 0x5, &(0x7f0000001a00)=[{0x88, 0x10d, 0x800000000000000, "03c345caa7b763570625fcc5c530a2e9d51d555038534ab9b25dbebd5d7d89eb34356afd4d7a3b67935e3f6bd9804c3ac0bf9f6deac2b1163316b53889636242c45f6da9fd3b5cbf98c2cf9bf4324ed8832996f07550098ca87fb31d24a1dc418eb0a347221f5ae9a7ac009ebd00e9e0b089ca5a"}, {0x18, 0x10b, 0x401, "434d5f26e1"}, {0x110, 0x3a, 0x8, "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"}, {0xa8, 0x0, 0x7ff, "7535481d62c0e2a5fd2b440b33cf92ded5d793e84f00676af87d406301a309731a12c62d6ee5ee729ae5aee6ee8f0b05774a6c99a3f60bff11246cf338eb979dec0de0415520f9c2e49299b27ccc384d7dbcad8e20f0e182ff25488c234a2a5969b311e426ae80a0c3e76ff539717bc20bde580e889ec491f5139e2fdded23072858a135f3a3fdc309c8f87627e8dca992b6345065ce20"}], 0x258}, 0x7}, {{&(0x7f0000001c80)=@ll={0x11, 0xf5, r5, 0x1, 0x400, 0x6, @dev={[], 0x15}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001d00)="3211ea103d52f779354e13b83a07c6c252c8faa1be0bc2a7b0b67062e861405dd6649b170a58fe5ab213060b12baf4ae83ccbcf0ef39b864cff9d2acea3001c8a231b0205924", 0x46}, {&(0x7f0000001d80)="562f3804e312950ebb2827c1348184d81e87558bb10df0dda9f9a820888621fef31ac71264ea6ecfcf2223af09ac5a31efc134d279f6adfb4e4d714b4dd8114a64320f16484133a352383bd82fe4701e4717f73a071d", 0x56}, {&(0x7f0000000500)="1d44e0ba3d9a9cf6080c768ce738d8d0e8e1f1e1946a2619d572e1df3f", 0x1d}, {&(0x7f00000007c0)="322a84641a30637cff899df97ce5e9a89d3a17", 0x13}, {&(0x7f0000001e40)="0034e398e4ef08fa4fa710ef77a6686d5360d6bbb5e8a55524c6b899463df896c0635e7bbab019c3b8f95973ee3423ff9c0e61f1bdde240d10519732f3397b923e7e5f2ab680571fb1c26e649159f01821026a645bfe7d50d5e6d3fec33aade69bd90531063eee753181", 0x6a}, {&(0x7f0000001ec0)="41ddbc23865826913cfa9eaeef2939701af630f4e893723a9694f1ba9323e2b116997e42dd482b376cfe8657be49535800ff3193aac669e1409b7d6a001eeef1502790f9c725b9ac37b8e598bd3ac7adf7486fa8bf997a2c790823d8a17e7c460cfe774ef41fabdf8908840d6f9a5da7e25d470db608cf39e472d6aa72b597c7e0709f709d63420c84d64b9655379f1ebc50b1cd5089e0cbf21a75a7ce3b36", 0x9f}, {&(0x7f0000001f80)="20b87df1902604dfea7c4fcc597c9af092c6bd14e7a0dc9726f6e7ad288e80af7459cc41b689424fdd55ae0cf7a2cb214707c4670327b18121d119198fa81a22573bd035937b1c4f78450642a19f1d1a408fb60c12cdd56eb2c273539402cf85d39a313f760fa37d05bce278e3979602420c2d6d2d3804832caf98ff678b68932c7e07a0ce7a0159e7bab535e1ed74bd4a34b33f318d77c9d4ebf2d654ab565bb2459ab6d823d5ef1e4a27f00e27a9b4f789cb7310eaaeff5b1749de94ebe8de9ec5d8f79e5e3e0e16", 0xc9}], 0x7, &(0x7f0000002100)=[{0xf8, 0x11f, 0x54b, "2d035c3a287e1a33245342a6cd9664a0743aa18f32d135bb0331d29ae3c682edf7cd9a15005f9f280c25bdc8e0091366d205e868cf742b9843a856079993ad13ba358d89cfca8b7488146ff6dec89f0923ead58d2e3f2396c8d993f088d9905bbcfb85c3074e04fca3966bca6e54318c9085228c1f681a8383169f2055f5ba48078a6ea16672c1fb722b92797a0c9ad2fa664636f8acf927286636ff15556617bb969e506d1f2a0c5c12947d46caf3a107fbd1abdd32574fd2200baa2919c63bde8cde4c9f189a2f0ac89fbbbff19a8f593df68c4bccbc17124b20a0fdcc904f0566d87de1"}], 0xf8}, 0x3}, {{&(0x7f0000002200)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x12000000000, 0x5b25, "5f970700915f5bcea2be42c5bc87b5c7043468b4eb7e6d74e9ca90d4aa747935677659af7b8c183130fe5e475c501f654954dd877b54b5a0c8b5c6a2f73b8f", 0x26}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002280)="76907f7ac35b73f0714ba76d136fe92827f74cac6dc9d54ce719f717193e3905a541c556b13da07daf8f1f626d93eeedae7155399a512cb54e129d9299217926a39a1a816ebf1378af353b7706bbe50c0cf73139029d63b77146db8e7de3ad97d6730dc35e36a2e071ae739e4b6511eccab9e4551f1c9458b1e5709ebd8b120f53f469152cd727cbc2db5f9418070318e1642652477206ea0f2909d011fc464aa90eb8420e97da2828c532", 0xab}, {&(0x7f0000002340)="7ddfe4d1ee14947a86f4108ef8e0305fc37acc06c71798a431bdd9b5354aecece632d3e3316abe8effdcc4d62c6ccf00136e68965c57d42d4e514ddaca274810ff27870d18b03ddf292632d8412f85f6bcde5ddc6993cd3c6bc2add229c329058d78101605ba1c528d44262d4fd83fad52b0ab14ef1a4683ca35ec10261dd4e21e43180b13ca3f190d14a848d2c7b9752c829ac12c8ac72321f741c39bb2028f0041c6adbe0557fcee529b46fe150af743be9c68b42dbfc5a4b1bc6eea72f9475101c8620493e5eb560afbf431893d6bbb07a713c06ec4c183061aad589b3036051ea926efd05c63d0d3", 0xea}, {&(0x7f0000002440)="c6cb171d", 0x4}, {&(0x7f0000002480)="1fbcf097e025151b861b648f43113d4a15b314b9750c7f7797539a851397a520b07af3e1199e8f4099c17feb1eb5145b5f050e24effd79f0c8806b8deab2c223e997433c6ff1e110ba791b1a4196bd1778752a5c86998383cefaeff213e3a1de585e83f1be2aa74933b5002a6f164e1ac2c92ad43dfd2208a1cb826cca4900c5de0aee850679c393a238a2cf82fd24244a5690a03245c10441571b33297b9338715c1e1ca088695de89b7c7f1723be2a322dcd0bb5c0fbb1abfb72e53a76d245278160caec5f9e42b31284f31f6bb5e91421f795128ccbb38504b0334cf6438db8b6d0856805991a579f1d2c586979fc4d5ac0f176d119b8", 0xf8}, {&(0x7f0000002580)="aa5da9b9c3a75e8f6fdb800900600a82b0242950b032225a534f516cf0a903ff122619854b0d74eab69ae6baf315e2b9ab72de508976cf978739cb84ffde564c92fa72a97e718cdc35f0b2d9d985e0886ea5cb17e975300a49277f1bebe1cc756264eba57659860c0484af5eb612a9e56dd1f7b490f2edd80ae6cfb99f296414c4a43b1c16315b6e5c9116b257528eb8689e9e2d31309d98ee61ca4ff0007238b63eeb93817c1e83dff180208c2b89671b5bb089abe8ae3c4842d260aa", 0xbd}, {&(0x7f0000002640)="385d750028be006a38cd62932475d401ff5d4b8dd70043d3ed0f138ced1bf3bfd7a4ca7fa4045aa5c2cafe9cf1d159e6cf7665025658f7cfde9a114e6ce1101449aff32ba586147ee2e8b895b56a4381beec235677c9fe5a7dc176c607156b01c66ec09205def1e8ff040bc05762a34a5014ee7b89def35f40c195dbec7d534d74b319f211f83a901a8e5479dd9b0e8d52b0", 0x92}], 0x6, &(0x7f0000002780)=[{0x108, 0x0, 0x8000, "a5c724c437a665c8eb6f3c9aa107465bb874a135bb296d4082110426f609ac2ff9057618640be5cef2a9750f5261a9503379b9977c1b40805e5a0b077bd8bd1ba21b61c116c973da08e042db0a691c8c7a4dfc030cf7a77b0a797403ee871b7b7afefd8ee1096ca0fb73e91c945f8d98014fac8fc3f1e9d4a835f06b34f0f740cb485d116ce1efc8da66d2a72f25bec342d4c8efc9fb94fad7078c03de49ed8d0f4a0a9d74b377137066036f36085e902c6d6d1e5ed3531f34a2e46940b0dc28bc34be697ef929c946dd60b97a19995f213124aaa626d686fb8bd0bf455c13d69747577c343faf79c8465bb0328c9a7fa6de2c153f6cb92b"}, {0x80, 0x115, 0x3ff, "6840f6dd3cca2e12b5fce822011cce18d4f75900b9183ddc2d43a4065981d2f9ed43301424da69ccf73bd8c357a1d756008e34a26d08bd2e75eda8ad3b4ba523380808f875701034e58c5b602cc06d324b3747d4bc0187fb2ebcd6de7ef166f3725c9204abffb9d82b15"}, {0x88, 0x13e, 0x1, "86ca2d8945f974523d3d6bc2c11e5f4666bee847bec3a860df6a768f410979dd2aa4b6c2a7a15e75012e684a6ce87f73ec5828182f67b008e8c0d4b68622efc05643c7aefca59b97eea16e95dc5e3d8ced973608de15b1db8507c29569c1cd17d85a6a4dd56ed97003ecb1c9ae01cb9851f928c2909e"}], 0x210}, 0x5}, {{&(0x7f00000029c0)=@sco={0x1f, {0xe3e0, 0x8, 0xef7, 0x9, 0xfffffffffffff000, 0x8f85}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)="6fdd601db3e842ffbe23fd338fe6ef576e704d83cb378f54e57044b9748f26370bbbc968f9c8c5bcfc5c360b10fc36ffecef3ebb86d6f7a57f26ab1186dd5405f4e53269f19c0fc02c3d219c35033297f2939bae9bcad386bd04dfce34c1c6658fc38a1798669ed420fcd97feaef49a7ccf7d5e7de019fbda072c664207bde4a7c412b8c59b4e381bd6c80c02bc32dd9c2fd317441136389ed615b169f4be32b06e64fb5c0f2c2eb34405f5c0e893d9ce69b303286c633e6c2dd026bf9d6567d24e3182e76588aa77eaa01997393311b45ccdc7bc443fca3a0ddfd060b7d2c522d579abe614d4080f4", 0xe9}], 0x1, &(0x7f0000002b80)=[{0x38, 0x19e, 0xd, "0c4b6378d0db5b0898385efb6f3264c70b1b93880744896f3d8b8ee2428fa3bd879fc5ed"}, {0x58, 0x105, 0x0, "0e0ecd1538d108d4b2f4cda8a469f0da69b521fb56577eb26412c1d391dba8f9a9de71d40cba29c3f25627fd086a65413b5cb369eb80dfdeb0eeadef89fb1ba7f819683de5"}, {0x1010, 0x117, 0x1ff, "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"}, {0x48, 0x119, 0x1, "3cd7e84b4a08ee195a4a4070a700c21f89a604941ada833251bcc420395bd9c6ed09d0ee280eaced1971a7d389b94cc493"}, {0x30, 0x100, 0x4, "9570c29bafbd2635ebd764435f240d7ed0e806bc361a35416998ad20711a743e"}, {0xa0, 0x114, 0x6, "098354bc51abb412eb8396daad4c3ddf90140917cdcd7f30aff32c4650c0d90a6cf1077781779703e83e4254349ca2d0db72ac871624e5b19e25e6cd2c18916f8260c0dc689240149090ff8100369f47bea66f478c25f637d42fa2a9c3973f1c048e474cfb657bc4897aa25df17ad6f397f688b676bd1e6d09f37425660e4588e05dea0963f1972da12e44"}], 0x11b8}, 0x101}, {{&(0x7f0000003d40)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003dc0)="23ce5c64edbaf6dfa974b15f2d5574d9806044c48add55631a2bde21a7ca5ac2e60cd02c461df19cf7855b4e11f786a65b0bc8c561e644b84f5b38dc47883ee723e50c9423bd777c7905d0ccf290640ec866ba73749775410cb10033fb8a22a9", 0x60}, {&(0x7f0000003e40)="c1fe07bcd1e9e16efdab3a1c3d4944a060c504a77938d23cc3f8b621daa5931f7d562a67704d3a4889ae52df1a6c3e05d4958a4fa1548649301608bee2528ef3b4c94396d7966d5a4368ac85c317bb6286ec7c70e21725b3d97213ee25a15df1470c9f50a64f42d4c27a3dbd3cbe1e2a2d9125f0c5215fdfe4210b4c338919cbc20845d146", 0x85}], 0x2, &(0x7f0000003f40)=[{0x50, 0x105, 0x8, "a514827fbb03559f7d8943177081bdc2d07096b3a2473f01d85760f26f64945f6f233ea4a36e33c76013323e42d26a58d3b0ed0f8e7702440a631ec5"}, {0x98, 0x1, 0x7fffffff, "3542dc0d707f2c86e79ab5dc3b7ea8e55f82bc850362e821cb5210eeb35361501bd4e1a9bf5908d7617336b7fee810461a0d7fbc7466c315bf1cd7ceaadbb9cf960b582836aff117291a12c83aaaa1c679985daf76fb3b03e11805e88ea53911adcc0e76ec983d260c91cca584e2be1ff7518822332038b357d6ded2c6dc2176dd9825fe317829a7"}, {0xa0, 0x118, 0x0, "e1bba5d20ce57453ef107f5aaec6c9f1be34d3c1066970e55a8d68f13b5290a82271193bb7f1a9d671ead71fc41f23ba7ef69be274a03b2614b91e03c1fc0ec516680da755ed657a332ef2bf4ccd492452c56e33ed0e01cc14b87b97052a4f1789f05cafdc5dcdf916fc5417585f2f13c7105cce7a539944be634ea3950877aef1ad3a48ff2c79cca79b"}, {0x60, 0x10e, 0x5, "0f8648ef982705c17d7149ba291f9dcd613fc89ad22ac732ede46841a28036ef5bdd0e73c62f3608e18e92fe844178b679105fcb1795e37d0d01d644d25c08d0279e908262947606043d311c3f"}, {0x48, 0x10d, 0x9, "e2f11b8173312128a5f9b25f93b0bca74a1f2217b5634876188a6de9c340628e5bbaaf7e0465864fc4506310dcc33d4bc7e35d19a80b"}, {0x70, 0x1ff, 0xbd6, "4f8a74ff0cf081353fad085731632ccca97e96b1fd69601cab092bdfd2dc330ffdeab8c6ffef628cb6218370c781c60b066010e498607f34f29235185a7b27359c4a13092872e4a39f3fc73e14793676936f96f36c0a1f671cc3"}, {0x108, 0x112, 0x3, "0bd09c0f804ae3e573e58d4ede8c0d661ebc32c4ec92065acc2191a487fcfb8af6a1112dd829492d0b3c51032de27ba58b3a8f6eb28713b76b4abe9b037eb0c85f512eec9a4ac07b4200ca87daa6ba7ed322378d43d6c3e492dae5e6f075482ab423d05b05f6c27cfcfe9b3de897e53e65168a2d3d8b7677e02b7a3fec12398d42a47fb1fdeb0355d5520c2d7a60c252a66968f86a69775c75b06b9095a36898e626699944696d34a873d97c83abadb364c65f0806892ace0ffc52cadbf6c059e38528466728229599bfbdf0b98f8ad2e464b57cc7a0dd1f8d4ab7c93b34d1ea01d1648f7ffa2753ac0bd0580d634ec0191bbb158a17e703"}, {0xb0, 0x11f, 0x75, "52d7a824d30984e5704bd03d72092fb3bc0ae0144cc0fb751f89467d67290c851c381a94e3acd7e8c39a28292d40a18c3b50181389b0f5f8257f4ed1002aa8bfe3f9af493dc7b0f4d81ed68840bbcdb230ebe730ac65078d5a6a27266bdb84620423a00f0f13158cf4ec6b2d30bdf46ae166dce068cdd4994224fef46cc27e586fbd79c42d8bf00752034ac993ce8163d62950ffd768927a45f9eb5bffe07d60"}, {0xa0, 0x3a, 0x5, "2d774b7a4c5f4f2ae70a9eab51a765c35910c4aed449f126b2b513510f4ac6cc4968a8f684dd4418c322770854da35f44079b91268c17ca7f3c3f5ad0e6787f590eb3e94ac49a4065b5bcc0d703f424f5b691de1494a300047708b3b08e2c928f14fa8b4b4595caf50c160ead2f9e672266c53ae398af5bec36bf0f8e5217aaa121b7c95c2a534bbb883"}], 0x4f8}, 0x6}], 0x5, 0x40) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) [ 1008.781150] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1008.788537] FAT-fs (loop0): Filesystem has been set read-only [ 1008.795064] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:20 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x16010000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:20 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x9) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000440)={{0x5, 0x4}, {0x1d0, 0xba}, 0x10000, 0x4, 0xffffffffffffffff}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:20 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="7fe91e0004"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000004580)={0xc000000000000000, 0x4, 0x7fffffff, 0x2, 0x19}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r3, &(0x7f0000004600), 0x8080ffeffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x4, 0x1, 0xb8, 0x81, 0xfffffffffffffff7, 0x1f}) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmmsg(r4, &(0x7f0000004440)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x3, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0x40}, 0x7}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000580)="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", 0xfb}, {&(0x7f0000000680)="76d467563851cf7ba1654283a103d918728d07f71256f254b0b848bf70742d6116e2637e70dafdc86d8d10948d3255749c7ec31dbd2e594e6dd3329f467a9caa472a9caba6da1fc7e562ae474d87cbeee378a6aae87240aa03dac51fad69fe5742c638ac0574d04c696b4749ea6740694dafaa674d5a4d06b0e82e39fe1438dd3515795538b691cccb", 0x89}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000740)="a53d0bf24cc65a5a76e5d57b2954295a6ddf8f16c18a8566ff4c9400ba25c26ceac69da793530ed4b411441eb65ef20ce5b910d8498a93bfcdbc94d245941d2607fa409a575db2fb86832f76c6589ac5eb8a979cecc9a701b2ac26f0b23619fc054920ce9c901382eab6c3f0", 0x6c}, {&(0x7f0000001880)="d2367eaa3ec215eaf2368f3660bd75876dfa9dfb622c2e54c5045ecb003c2f885251e9a76d2d98d5fb476f1a44d7c41d32f2513bbadc3292e2bca82cdd8518b1be1667b3fa5958e2c77ad1ceb4ee3960ea83c9c96ed2a5d9e77042a51e463258fcc845178aaa6aeb60709667c8e41d6bd4c2ad5932a06edaf16bd5cabfc724ac4a76b4e8e010c9b2d09ee6bf812dc7c60a65657388f2342aee7e9e5df22bd6fc79d7a3b1bd7c6e44c50e5629fa60f5873895a1ad29335e886a7c308b6ce5e8f2fd4dae904e1c99eb273fa9722e45edb30fcd6d23396788d0cc65108dd09c256b211bb8f47581591960255d52a0601ad0cb553e7eb1a113e2c5", 0xf9}], 0x5, &(0x7f0000001a00)=[{0x88, 0x10d, 0x800000000000000, "03c345caa7b763570625fcc5c530a2e9d51d555038534ab9b25dbebd5d7d89eb34356afd4d7a3b67935e3f6bd9804c3ac0bf9f6deac2b1163316b53889636242c45f6da9fd3b5cbf98c2cf9bf4324ed8832996f07550098ca87fb31d24a1dc418eb0a347221f5ae9a7ac009ebd00e9e0b089ca5a"}, {0x18, 0x10b, 0x401, "434d5f26e1"}, {0x110, 0x3a, 0x8, "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"}, {0xa8, 0x0, 0x7ff, "7535481d62c0e2a5fd2b440b33cf92ded5d793e84f00676af87d406301a309731a12c62d6ee5ee729ae5aee6ee8f0b05774a6c99a3f60bff11246cf338eb979dec0de0415520f9c2e49299b27ccc384d7dbcad8e20f0e182ff25488c234a2a5969b311e426ae80a0c3e76ff539717bc20bde580e889ec491f5139e2fdded23072858a135f3a3fdc309c8f87627e8dca992b6345065ce20"}], 0x258}, 0x7}, {{&(0x7f0000001c80)=@ll={0x11, 0xf5, r5, 0x1, 0x400, 0x6, @dev={[], 0x15}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001d00)="3211ea103d52f779354e13b83a07c6c252c8faa1be0bc2a7b0b67062e861405dd6649b170a58fe5ab213060b12baf4ae83ccbcf0ef39b864cff9d2acea3001c8a231b0205924", 0x46}, {&(0x7f0000001d80)="562f3804e312950ebb2827c1348184d81e87558bb10df0dda9f9a820888621fef31ac71264ea6ecfcf2223af09ac5a31efc134d279f6adfb4e4d714b4dd8114a64320f16484133a352383bd82fe4701e4717f73a071d", 0x56}, {&(0x7f0000000500)="1d44e0ba3d9a9cf6080c768ce738d8d0e8e1f1e1946a2619d572e1df3f", 0x1d}, {&(0x7f00000007c0)="322a84641a30637cff899df97ce5e9a89d3a17", 0x13}, {&(0x7f0000001e40)="0034e398e4ef08fa4fa710ef77a6686d5360d6bbb5e8a55524c6b899463df896c0635e7bbab019c3b8f95973ee3423ff9c0e61f1bdde240d10519732f3397b923e7e5f2ab680571fb1c26e649159f01821026a645bfe7d50d5e6d3fec33aade69bd90531063eee753181", 0x6a}, {&(0x7f0000001ec0)="41ddbc23865826913cfa9eaeef2939701af630f4e893723a9694f1ba9323e2b116997e42dd482b376cfe8657be49535800ff3193aac669e1409b7d6a001eeef1502790f9c725b9ac37b8e598bd3ac7adf7486fa8bf997a2c790823d8a17e7c460cfe774ef41fabdf8908840d6f9a5da7e25d470db608cf39e472d6aa72b597c7e0709f709d63420c84d64b9655379f1ebc50b1cd5089e0cbf21a75a7ce3b36", 0x9f}, {&(0x7f0000001f80)="20b87df1902604dfea7c4fcc597c9af092c6bd14e7a0dc9726f6e7ad288e80af7459cc41b689424fdd55ae0cf7a2cb214707c4670327b18121d119198fa81a22573bd035937b1c4f78450642a19f1d1a408fb60c12cdd56eb2c273539402cf85d39a313f760fa37d05bce278e3979602420c2d6d2d3804832caf98ff678b68932c7e07a0ce7a0159e7bab535e1ed74bd4a34b33f318d77c9d4ebf2d654ab565bb2459ab6d823d5ef1e4a27f00e27a9b4f789cb7310eaaeff5b1749de94ebe8de9ec5d8f79e5e3e0e16", 0xc9}], 0x7, &(0x7f0000002100)=[{0xf8, 0x11f, 0x54b, "2d035c3a287e1a33245342a6cd9664a0743aa18f32d135bb0331d29ae3c682edf7cd9a15005f9f280c25bdc8e0091366d205e868cf742b9843a856079993ad13ba358d89cfca8b7488146ff6dec89f0923ead58d2e3f2396c8d993f088d9905bbcfb85c3074e04fca3966bca6e54318c9085228c1f681a8383169f2055f5ba48078a6ea16672c1fb722b92797a0c9ad2fa664636f8acf927286636ff15556617bb969e506d1f2a0c5c12947d46caf3a107fbd1abdd32574fd2200baa2919c63bde8cde4c9f189a2f0ac89fbbbff19a8f593df68c4bccbc17124b20a0fdcc904f0566d87de1"}], 0xf8}, 0x3}, {{&(0x7f0000002200)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x12000000000, 0x5b25, "5f970700915f5bcea2be42c5bc87b5c7043468b4eb7e6d74e9ca90d4aa747935677659af7b8c183130fe5e475c501f654954dd877b54b5a0c8b5c6a2f73b8f", 0x26}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002280)="76907f7ac35b73f0714ba76d136fe92827f74cac6dc9d54ce719f717193e3905a541c556b13da07daf8f1f626d93eeedae7155399a512cb54e129d9299217926a39a1a816ebf1378af353b7706bbe50c0cf73139029d63b77146db8e7de3ad97d6730dc35e36a2e071ae739e4b6511eccab9e4551f1c9458b1e5709ebd8b120f53f469152cd727cbc2db5f9418070318e1642652477206ea0f2909d011fc464aa90eb8420e97da2828c532", 0xab}, {&(0x7f0000002340)="7ddfe4d1ee14947a86f4108ef8e0305fc37acc06c71798a431bdd9b5354aecece632d3e3316abe8effdcc4d62c6ccf00136e68965c57d42d4e514ddaca274810ff27870d18b03ddf292632d8412f85f6bcde5ddc6993cd3c6bc2add229c329058d78101605ba1c528d44262d4fd83fad52b0ab14ef1a4683ca35ec10261dd4e21e43180b13ca3f190d14a848d2c7b9752c829ac12c8ac72321f741c39bb2028f0041c6adbe0557fcee529b46fe150af743be9c68b42dbfc5a4b1bc6eea72f9475101c8620493e5eb560afbf431893d6bbb07a713c06ec4c183061aad589b3036051ea926efd05c63d0d3", 0xea}, {&(0x7f0000002440)="c6cb171d", 0x4}, {&(0x7f0000002480)="1fbcf097e025151b861b648f43113d4a15b314b9750c7f7797539a851397a520b07af3e1199e8f4099c17feb1eb5145b5f050e24effd79f0c8806b8deab2c223e997433c6ff1e110ba791b1a4196bd1778752a5c86998383cefaeff213e3a1de585e83f1be2aa74933b5002a6f164e1ac2c92ad43dfd2208a1cb826cca4900c5de0aee850679c393a238a2cf82fd24244a5690a03245c10441571b33297b9338715c1e1ca088695de89b7c7f1723be2a322dcd0bb5c0fbb1abfb72e53a76d245278160caec5f9e42b31284f31f6bb5e91421f795128ccbb38504b0334cf6438db8b6d0856805991a579f1d2c586979fc4d5ac0f176d119b8", 0xf8}, {&(0x7f0000002580)="aa5da9b9c3a75e8f6fdb800900600a82b0242950b032225a534f516cf0a903ff122619854b0d74eab69ae6baf315e2b9ab72de508976cf978739cb84ffde564c92fa72a97e718cdc35f0b2d9d985e0886ea5cb17e975300a49277f1bebe1cc756264eba57659860c0484af5eb612a9e56dd1f7b490f2edd80ae6cfb99f296414c4a43b1c16315b6e5c9116b257528eb8689e9e2d31309d98ee61ca4ff0007238b63eeb93817c1e83dff180208c2b89671b5bb089abe8ae3c4842d260aa", 0xbd}, {&(0x7f0000002640)="385d750028be006a38cd62932475d401ff5d4b8dd70043d3ed0f138ced1bf3bfd7a4ca7fa4045aa5c2cafe9cf1d159e6cf7665025658f7cfde9a114e6ce1101449aff32ba586147ee2e8b895b56a4381beec235677c9fe5a7dc176c607156b01c66ec09205def1e8ff040bc05762a34a5014ee7b89def35f40c195dbec7d534d74b319f211f83a901a8e5479dd9b0e8d52b0", 0x92}], 0x6, &(0x7f0000002780)=[{0x108, 0x0, 0x8000, "a5c724c437a665c8eb6f3c9aa107465bb874a135bb296d4082110426f609ac2ff9057618640be5cef2a9750f5261a9503379b9977c1b40805e5a0b077bd8bd1ba21b61c116c973da08e042db0a691c8c7a4dfc030cf7a77b0a797403ee871b7b7afefd8ee1096ca0fb73e91c945f8d98014fac8fc3f1e9d4a835f06b34f0f740cb485d116ce1efc8da66d2a72f25bec342d4c8efc9fb94fad7078c03de49ed8d0f4a0a9d74b377137066036f36085e902c6d6d1e5ed3531f34a2e46940b0dc28bc34be697ef929c946dd60b97a19995f213124aaa626d686fb8bd0bf455c13d69747577c343faf79c8465bb0328c9a7fa6de2c153f6cb92b"}, {0x80, 0x115, 0x3ff, "6840f6dd3cca2e12b5fce822011cce18d4f75900b9183ddc2d43a4065981d2f9ed43301424da69ccf73bd8c357a1d756008e34a26d08bd2e75eda8ad3b4ba523380808f875701034e58c5b602cc06d324b3747d4bc0187fb2ebcd6de7ef166f3725c9204abffb9d82b15"}, {0x88, 0x13e, 0x1, "86ca2d8945f974523d3d6bc2c11e5f4666bee847bec3a860df6a768f410979dd2aa4b6c2a7a15e75012e684a6ce87f73ec5828182f67b008e8c0d4b68622efc05643c7aefca59b97eea16e95dc5e3d8ced973608de15b1db8507c29569c1cd17d85a6a4dd56ed97003ecb1c9ae01cb9851f928c2909e"}], 0x210}, 0x5}, {{&(0x7f00000029c0)=@sco={0x1f, {0xe3e0, 0x8, 0xef7, 0x9, 0xfffffffffffff000, 0x8f85}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)="6fdd601db3e842ffbe23fd338fe6ef576e704d83cb378f54e57044b9748f26370bbbc968f9c8c5bcfc5c360b10fc36ffecef3ebb86d6f7a57f26ab1186dd5405f4e53269f19c0fc02c3d219c35033297f2939bae9bcad386bd04dfce34c1c6658fc38a1798669ed420fcd97feaef49a7ccf7d5e7de019fbda072c664207bde4a7c412b8c59b4e381bd6c80c02bc32dd9c2fd317441136389ed615b169f4be32b06e64fb5c0f2c2eb34405f5c0e893d9ce69b303286c633e6c2dd026bf9d6567d24e3182e76588aa77eaa01997393311b45ccdc7bc443fca3a0ddfd060b7d2c522d579abe614d4080f4", 0xe9}], 0x1, &(0x7f0000002b80)=[{0x38, 0x19e, 0xd, "0c4b6378d0db5b0898385efb6f3264c70b1b93880744896f3d8b8ee2428fa3bd879fc5ed"}, {0x58, 0x105, 0x0, "0e0ecd1538d108d4b2f4cda8a469f0da69b521fb56577eb26412c1d391dba8f9a9de71d40cba29c3f25627fd086a65413b5cb369eb80dfdeb0eeadef89fb1ba7f819683de5"}, {0x1010, 0x117, 0x1ff, "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"}, {0x48, 0x119, 0x1, "3cd7e84b4a08ee195a4a4070a700c21f89a604941ada833251bcc420395bd9c6ed09d0ee280eaced1971a7d389b94cc493"}, {0x30, 0x100, 0x4, "9570c29bafbd2635ebd764435f240d7ed0e806bc361a35416998ad20711a743e"}, {0xa0, 0x114, 0x6, "098354bc51abb412eb8396daad4c3ddf90140917cdcd7f30aff32c4650c0d90a6cf1077781779703e83e4254349ca2d0db72ac871624e5b19e25e6cd2c18916f8260c0dc689240149090ff8100369f47bea66f478c25f637d42fa2a9c3973f1c048e474cfb657bc4897aa25df17ad6f397f688b676bd1e6d09f37425660e4588e05dea0963f1972da12e44"}], 0x11b8}, 0x101}, {{&(0x7f0000003d40)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003dc0)="23ce5c64edbaf6dfa974b15f2d5574d9806044c48add55631a2bde21a7ca5ac2e60cd02c461df19cf7855b4e11f786a65b0bc8c561e644b84f5b38dc47883ee723e50c9423bd777c7905d0ccf290640ec866ba73749775410cb10033fb8a22a9", 0x60}, {&(0x7f0000003e40)="c1fe07bcd1e9e16efdab3a1c3d4944a060c504a77938d23cc3f8b621daa5931f7d562a67704d3a4889ae52df1a6c3e05d4958a4fa1548649301608bee2528ef3b4c94396d7966d5a4368ac85c317bb6286ec7c70e21725b3d97213ee25a15df1470c9f50a64f42d4c27a3dbd3cbe1e2a2d9125f0c5215fdfe4210b4c338919cbc20845d146", 0x85}], 0x2, &(0x7f0000003f40)=[{0x50, 0x105, 0x8, "a514827fbb03559f7d8943177081bdc2d07096b3a2473f01d85760f26f64945f6f233ea4a36e33c76013323e42d26a58d3b0ed0f8e7702440a631ec5"}, {0x98, 0x1, 0x7fffffff, "3542dc0d707f2c86e79ab5dc3b7ea8e55f82bc850362e821cb5210eeb35361501bd4e1a9bf5908d7617336b7fee810461a0d7fbc7466c315bf1cd7ceaadbb9cf960b582836aff117291a12c83aaaa1c679985daf76fb3b03e11805e88ea53911adcc0e76ec983d260c91cca584e2be1ff7518822332038b357d6ded2c6dc2176dd9825fe317829a7"}, {0xa0, 0x118, 0x0, "e1bba5d20ce57453ef107f5aaec6c9f1be34d3c1066970e55a8d68f13b5290a82271193bb7f1a9d671ead71fc41f23ba7ef69be274a03b2614b91e03c1fc0ec516680da755ed657a332ef2bf4ccd492452c56e33ed0e01cc14b87b97052a4f1789f05cafdc5dcdf916fc5417585f2f13c7105cce7a539944be634ea3950877aef1ad3a48ff2c79cca79b"}, {0x60, 0x10e, 0x5, "0f8648ef982705c17d7149ba291f9dcd613fc89ad22ac732ede46841a28036ef5bdd0e73c62f3608e18e92fe844178b679105fcb1795e37d0d01d644d25c08d0279e908262947606043d311c3f"}, {0x48, 0x10d, 0x9, "e2f11b8173312128a5f9b25f93b0bca74a1f2217b5634876188a6de9c340628e5bbaaf7e0465864fc4506310dcc33d4bc7e35d19a80b"}, {0x70, 0x1ff, 0xbd6, "4f8a74ff0cf081353fad085731632ccca97e96b1fd69601cab092bdfd2dc330ffdeab8c6ffef628cb6218370c781c60b066010e498607f34f29235185a7b27359c4a13092872e4a39f3fc73e14793676936f96f36c0a1f671cc3"}, {0x108, 0x112, 0x3, "0bd09c0f804ae3e573e58d4ede8c0d661ebc32c4ec92065acc2191a487fcfb8af6a1112dd829492d0b3c51032de27ba58b3a8f6eb28713b76b4abe9b037eb0c85f512eec9a4ac07b4200ca87daa6ba7ed322378d43d6c3e492dae5e6f075482ab423d05b05f6c27cfcfe9b3de897e53e65168a2d3d8b7677e02b7a3fec12398d42a47fb1fdeb0355d5520c2d7a60c252a66968f86a69775c75b06b9095a36898e626699944696d34a873d97c83abadb364c65f0806892ace0ffc52cadbf6c059e38528466728229599bfbdf0b98f8ad2e464b57cc7a0dd1f8d4ab7c93b34d1ea01d1648f7ffa2753ac0bd0580d634ec0191bbb158a17e703"}, {0xb0, 0x11f, 0x75, "52d7a824d30984e5704bd03d72092fb3bc0ae0144cc0fb751f89467d67290c851c381a94e3acd7e8c39a28292d40a18c3b50181389b0f5f8257f4ed1002aa8bfe3f9af493dc7b0f4d81ed68840bbcdb230ebe730ac65078d5a6a27266bdb84620423a00f0f13158cf4ec6b2d30bdf46ae166dce068cdd4994224fef46cc27e586fbd79c42d8bf00752034ac993ce8163d62950ffd768927a45f9eb5bffe07d60"}, {0xa0, 0x3a, 0x5, "2d774b7a4c5f4f2ae70a9eab51a765c35910c4aed449f126b2b513510f4ac6cc4968a8f684dd4418c322770854da35f44079b91268c17ca7f3c3f5ad0e6787f590eb3e94ac49a4065b5bcc0d703f424f5b691de1494a300047708b3b08e2c928f14fa8b4b4595caf50c160ead2f9e672266c53ae398af5bec36bf0f8e5217aaa121b7c95c2a534bbb883"}], 0x4f8}, 0x6}], 0x5, 0x40) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:20 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="14d61e2000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x40000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:20 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1010.660784] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1010.729539] FAT-fs (loop4): Filesystem has been set read-only 02:14:21 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="7fe91e0004"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000004580)={0xc000000000000000, 0x4, 0x7fffffff, 0x2, 0x19}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r3, &(0x7f0000004600), 0x8080ffeffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x4, 0x1, 0xb8, 0x81, 0xfffffffffffffff7, 0x1f}) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmmsg(r4, &(0x7f0000004440)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x3, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0x40}, 0x7}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000580)="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", 0xfb}, {&(0x7f0000000680)="76d467563851cf7ba1654283a103d918728d07f71256f254b0b848bf70742d6116e2637e70dafdc86d8d10948d3255749c7ec31dbd2e594e6dd3329f467a9caa472a9caba6da1fc7e562ae474d87cbeee378a6aae87240aa03dac51fad69fe5742c638ac0574d04c696b4749ea6740694dafaa674d5a4d06b0e82e39fe1438dd3515795538b691cccb", 0x89}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000740)="a53d0bf24cc65a5a76e5d57b2954295a6ddf8f16c18a8566ff4c9400ba25c26ceac69da793530ed4b411441eb65ef20ce5b910d8498a93bfcdbc94d245941d2607fa409a575db2fb86832f76c6589ac5eb8a979cecc9a701b2ac26f0b23619fc054920ce9c901382eab6c3f0", 0x6c}, {&(0x7f0000001880)="d2367eaa3ec215eaf2368f3660bd75876dfa9dfb622c2e54c5045ecb003c2f885251e9a76d2d98d5fb476f1a44d7c41d32f2513bbadc3292e2bca82cdd8518b1be1667b3fa5958e2c77ad1ceb4ee3960ea83c9c96ed2a5d9e77042a51e463258fcc845178aaa6aeb60709667c8e41d6bd4c2ad5932a06edaf16bd5cabfc724ac4a76b4e8e010c9b2d09ee6bf812dc7c60a65657388f2342aee7e9e5df22bd6fc79d7a3b1bd7c6e44c50e5629fa60f5873895a1ad29335e886a7c308b6ce5e8f2fd4dae904e1c99eb273fa9722e45edb30fcd6d23396788d0cc65108dd09c256b211bb8f47581591960255d52a0601ad0cb553e7eb1a113e2c5", 0xf9}], 0x5, &(0x7f0000001a00)=[{0x88, 0x10d, 0x800000000000000, "03c345caa7b763570625fcc5c530a2e9d51d555038534ab9b25dbebd5d7d89eb34356afd4d7a3b67935e3f6bd9804c3ac0bf9f6deac2b1163316b53889636242c45f6da9fd3b5cbf98c2cf9bf4324ed8832996f07550098ca87fb31d24a1dc418eb0a347221f5ae9a7ac009ebd00e9e0b089ca5a"}, {0x18, 0x10b, 0x401, "434d5f26e1"}, {0x110, 0x3a, 0x8, "dd82597556459632f3510eca797d5a8e82873b9a44bb71b17652ccaea2c37b0211294f471d0a719f31b49d13670287310ea54ea13470c6ea537658f860445746f146abd9314f047143175739052ebbb7948186ea9af7732ee092105f26aa403cdbb49046fbd87cf48a753daae5543f3c2679e212c2f7043009dba911e7d609119bc91e8548e2fb289ac4481117fe465058ef6fa56aef9be5557952b4f3f8151b10780f6e63ac3055e84026f22bfb2c348182fee6e7af52a404bfb65f53e551c99ce64df88850c1d2f60d923d420192b0df248468ba895465fcbe042aa4e2e04c7966e1a05ab0df77ab72acd24e1a2e3692fc304fcbcda11ee39e9535f87864"}, {0xa8, 0x0, 0x7ff, "7535481d62c0e2a5fd2b440b33cf92ded5d793e84f00676af87d406301a309731a12c62d6ee5ee729ae5aee6ee8f0b05774a6c99a3f60bff11246cf338eb979dec0de0415520f9c2e49299b27ccc384d7dbcad8e20f0e182ff25488c234a2a5969b311e426ae80a0c3e76ff539717bc20bde580e889ec491f5139e2fdded23072858a135f3a3fdc309c8f87627e8dca992b6345065ce20"}], 0x258}, 0x7}, {{&(0x7f0000001c80)=@ll={0x11, 0xf5, r5, 0x1, 0x400, 0x6, @dev={[], 0x15}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001d00)="3211ea103d52f779354e13b83a07c6c252c8faa1be0bc2a7b0b67062e861405dd6649b170a58fe5ab213060b12baf4ae83ccbcf0ef39b864cff9d2acea3001c8a231b0205924", 0x46}, {&(0x7f0000001d80)="562f3804e312950ebb2827c1348184d81e87558bb10df0dda9f9a820888621fef31ac71264ea6ecfcf2223af09ac5a31efc134d279f6adfb4e4d714b4dd8114a64320f16484133a352383bd82fe4701e4717f73a071d", 0x56}, {&(0x7f0000000500)="1d44e0ba3d9a9cf6080c768ce738d8d0e8e1f1e1946a2619d572e1df3f", 0x1d}, {&(0x7f00000007c0)="322a84641a30637cff899df97ce5e9a89d3a17", 0x13}, {&(0x7f0000001e40)="0034e398e4ef08fa4fa710ef77a6686d5360d6bbb5e8a55524c6b899463df896c0635e7bbab019c3b8f95973ee3423ff9c0e61f1bdde240d10519732f3397b923e7e5f2ab680571fb1c26e649159f01821026a645bfe7d50d5e6d3fec33aade69bd90531063eee753181", 0x6a}, {&(0x7f0000001ec0)="41ddbc23865826913cfa9eaeef2939701af630f4e893723a9694f1ba9323e2b116997e42dd482b376cfe8657be49535800ff3193aac669e1409b7d6a001eeef1502790f9c725b9ac37b8e598bd3ac7adf7486fa8bf997a2c790823d8a17e7c460cfe774ef41fabdf8908840d6f9a5da7e25d470db608cf39e472d6aa72b597c7e0709f709d63420c84d64b9655379f1ebc50b1cd5089e0cbf21a75a7ce3b36", 0x9f}, {&(0x7f0000001f80)="20b87df1902604dfea7c4fcc597c9af092c6bd14e7a0dc9726f6e7ad288e80af7459cc41b689424fdd55ae0cf7a2cb214707c4670327b18121d119198fa81a22573bd035937b1c4f78450642a19f1d1a408fb60c12cdd56eb2c273539402cf85d39a313f760fa37d05bce278e3979602420c2d6d2d3804832caf98ff678b68932c7e07a0ce7a0159e7bab535e1ed74bd4a34b33f318d77c9d4ebf2d654ab565bb2459ab6d823d5ef1e4a27f00e27a9b4f789cb7310eaaeff5b1749de94ebe8de9ec5d8f79e5e3e0e16", 0xc9}], 0x7, &(0x7f0000002100)=[{0xf8, 0x11f, 0x54b, "2d035c3a287e1a33245342a6cd9664a0743aa18f32d135bb0331d29ae3c682edf7cd9a15005f9f280c25bdc8e0091366d205e868cf742b9843a856079993ad13ba358d89cfca8b7488146ff6dec89f0923ead58d2e3f2396c8d993f088d9905bbcfb85c3074e04fca3966bca6e54318c9085228c1f681a8383169f2055f5ba48078a6ea16672c1fb722b92797a0c9ad2fa664636f8acf927286636ff15556617bb969e506d1f2a0c5c12947d46caf3a107fbd1abdd32574fd2200baa2919c63bde8cde4c9f189a2f0ac89fbbbff19a8f593df68c4bccbc17124b20a0fdcc904f0566d87de1"}], 0xf8}, 0x3}, {{&(0x7f0000002200)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x12000000000, 0x5b25, "5f970700915f5bcea2be42c5bc87b5c7043468b4eb7e6d74e9ca90d4aa747935677659af7b8c183130fe5e475c501f654954dd877b54b5a0c8b5c6a2f73b8f", 0x26}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002280)="76907f7ac35b73f0714ba76d136fe92827f74cac6dc9d54ce719f717193e3905a541c556b13da07daf8f1f626d93eeedae7155399a512cb54e129d9299217926a39a1a816ebf1378af353b7706bbe50c0cf73139029d63b77146db8e7de3ad97d6730dc35e36a2e071ae739e4b6511eccab9e4551f1c9458b1e5709ebd8b120f53f469152cd727cbc2db5f9418070318e1642652477206ea0f2909d011fc464aa90eb8420e97da2828c532", 0xab}, {&(0x7f0000002340)="7ddfe4d1ee14947a86f4108ef8e0305fc37acc06c71798a431bdd9b5354aecece632d3e3316abe8effdcc4d62c6ccf00136e68965c57d42d4e514ddaca274810ff27870d18b03ddf292632d8412f85f6bcde5ddc6993cd3c6bc2add229c329058d78101605ba1c528d44262d4fd83fad52b0ab14ef1a4683ca35ec10261dd4e21e43180b13ca3f190d14a848d2c7b9752c829ac12c8ac72321f741c39bb2028f0041c6adbe0557fcee529b46fe150af743be9c68b42dbfc5a4b1bc6eea72f9475101c8620493e5eb560afbf431893d6bbb07a713c06ec4c183061aad589b3036051ea926efd05c63d0d3", 0xea}, {&(0x7f0000002440)="c6cb171d", 0x4}, {&(0x7f0000002480)="1fbcf097e025151b861b648f43113d4a15b314b9750c7f7797539a851397a520b07af3e1199e8f4099c17feb1eb5145b5f050e24effd79f0c8806b8deab2c223e997433c6ff1e110ba791b1a4196bd1778752a5c86998383cefaeff213e3a1de585e83f1be2aa74933b5002a6f164e1ac2c92ad43dfd2208a1cb826cca4900c5de0aee850679c393a238a2cf82fd24244a5690a03245c10441571b33297b9338715c1e1ca088695de89b7c7f1723be2a322dcd0bb5c0fbb1abfb72e53a76d245278160caec5f9e42b31284f31f6bb5e91421f795128ccbb38504b0334cf6438db8b6d0856805991a579f1d2c586979fc4d5ac0f176d119b8", 0xf8}, {&(0x7f0000002580)="aa5da9b9c3a75e8f6fdb800900600a82b0242950b032225a534f516cf0a903ff122619854b0d74eab69ae6baf315e2b9ab72de508976cf978739cb84ffde564c92fa72a97e718cdc35f0b2d9d985e0886ea5cb17e975300a49277f1bebe1cc756264eba57659860c0484af5eb612a9e56dd1f7b490f2edd80ae6cfb99f296414c4a43b1c16315b6e5c9116b257528eb8689e9e2d31309d98ee61ca4ff0007238b63eeb93817c1e83dff180208c2b89671b5bb089abe8ae3c4842d260aa", 0xbd}, {&(0x7f0000002640)="385d750028be006a38cd62932475d401ff5d4b8dd70043d3ed0f138ced1bf3bfd7a4ca7fa4045aa5c2cafe9cf1d159e6cf7665025658f7cfde9a114e6ce1101449aff32ba586147ee2e8b895b56a4381beec235677c9fe5a7dc176c607156b01c66ec09205def1e8ff040bc05762a34a5014ee7b89def35f40c195dbec7d534d74b319f211f83a901a8e5479dd9b0e8d52b0", 0x92}], 0x6, &(0x7f0000002780)=[{0x108, 0x0, 0x8000, "a5c724c437a665c8eb6f3c9aa107465bb874a135bb296d4082110426f609ac2ff9057618640be5cef2a9750f5261a9503379b9977c1b40805e5a0b077bd8bd1ba21b61c116c973da08e042db0a691c8c7a4dfc030cf7a77b0a797403ee871b7b7afefd8ee1096ca0fb73e91c945f8d98014fac8fc3f1e9d4a835f06b34f0f740cb485d116ce1efc8da66d2a72f25bec342d4c8efc9fb94fad7078c03de49ed8d0f4a0a9d74b377137066036f36085e902c6d6d1e5ed3531f34a2e46940b0dc28bc34be697ef929c946dd60b97a19995f213124aaa626d686fb8bd0bf455c13d69747577c343faf79c8465bb0328c9a7fa6de2c153f6cb92b"}, {0x80, 0x115, 0x3ff, "6840f6dd3cca2e12b5fce822011cce18d4f75900b9183ddc2d43a4065981d2f9ed43301424da69ccf73bd8c357a1d756008e34a26d08bd2e75eda8ad3b4ba523380808f875701034e58c5b602cc06d324b3747d4bc0187fb2ebcd6de7ef166f3725c9204abffb9d82b15"}, {0x88, 0x13e, 0x1, "86ca2d8945f974523d3d6bc2c11e5f4666bee847bec3a860df6a768f410979dd2aa4b6c2a7a15e75012e684a6ce87f73ec5828182f67b008e8c0d4b68622efc05643c7aefca59b97eea16e95dc5e3d8ced973608de15b1db8507c29569c1cd17d85a6a4dd56ed97003ecb1c9ae01cb9851f928c2909e"}], 0x210}, 0x5}, {{&(0x7f00000029c0)=@sco={0x1f, {0xe3e0, 0x8, 0xef7, 0x9, 0xfffffffffffff000, 0x8f85}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)="6fdd601db3e842ffbe23fd338fe6ef576e704d83cb378f54e57044b9748f26370bbbc968f9c8c5bcfc5c360b10fc36ffecef3ebb86d6f7a57f26ab1186dd5405f4e53269f19c0fc02c3d219c35033297f2939bae9bcad386bd04dfce34c1c6658fc38a1798669ed420fcd97feaef49a7ccf7d5e7de019fbda072c664207bde4a7c412b8c59b4e381bd6c80c02bc32dd9c2fd317441136389ed615b169f4be32b06e64fb5c0f2c2eb34405f5c0e893d9ce69b303286c633e6c2dd026bf9d6567d24e3182e76588aa77eaa01997393311b45ccdc7bc443fca3a0ddfd060b7d2c522d579abe614d4080f4", 0xe9}], 0x1, &(0x7f0000002b80)=[{0x38, 0x19e, 0xd, "0c4b6378d0db5b0898385efb6f3264c70b1b93880744896f3d8b8ee2428fa3bd879fc5ed"}, {0x58, 0x105, 0x0, "0e0ecd1538d108d4b2f4cda8a469f0da69b521fb56577eb26412c1d391dba8f9a9de71d40cba29c3f25627fd086a65413b5cb369eb80dfdeb0eeadef89fb1ba7f819683de5"}, {0x1010, 0x117, 0x1ff, "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"}, {0x48, 0x119, 0x1, "3cd7e84b4a08ee195a4a4070a700c21f89a604941ada833251bcc420395bd9c6ed09d0ee280eaced1971a7d389b94cc493"}, {0x30, 0x100, 0x4, "9570c29bafbd2635ebd764435f240d7ed0e806bc361a35416998ad20711a743e"}, {0xa0, 0x114, 0x6, "098354bc51abb412eb8396daad4c3ddf90140917cdcd7f30aff32c4650c0d90a6cf1077781779703e83e4254349ca2d0db72ac871624e5b19e25e6cd2c18916f8260c0dc689240149090ff8100369f47bea66f478c25f637d42fa2a9c3973f1c048e474cfb657bc4897aa25df17ad6f397f688b676bd1e6d09f37425660e4588e05dea0963f1972da12e44"}], 0x11b8}, 0x101}, {{&(0x7f0000003d40)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003dc0)="23ce5c64edbaf6dfa974b15f2d5574d9806044c48add55631a2bde21a7ca5ac2e60cd02c461df19cf7855b4e11f786a65b0bc8c561e644b84f5b38dc47883ee723e50c9423bd777c7905d0ccf290640ec866ba73749775410cb10033fb8a22a9", 0x60}, {&(0x7f0000003e40)="c1fe07bcd1e9e16efdab3a1c3d4944a060c504a77938d23cc3f8b621daa5931f7d562a67704d3a4889ae52df1a6c3e05d4958a4fa1548649301608bee2528ef3b4c94396d7966d5a4368ac85c317bb6286ec7c70e21725b3d97213ee25a15df1470c9f50a64f42d4c27a3dbd3cbe1e2a2d9125f0c5215fdfe4210b4c338919cbc20845d146", 0x85}], 0x2, &(0x7f0000003f40)=[{0x50, 0x105, 0x8, "a514827fbb03559f7d8943177081bdc2d07096b3a2473f01d85760f26f64945f6f233ea4a36e33c76013323e42d26a58d3b0ed0f8e7702440a631ec5"}, {0x98, 0x1, 0x7fffffff, "3542dc0d707f2c86e79ab5dc3b7ea8e55f82bc850362e821cb5210eeb35361501bd4e1a9bf5908d7617336b7fee810461a0d7fbc7466c315bf1cd7ceaadbb9cf960b582836aff117291a12c83aaaa1c679985daf76fb3b03e11805e88ea53911adcc0e76ec983d260c91cca584e2be1ff7518822332038b357d6ded2c6dc2176dd9825fe317829a7"}, {0xa0, 0x118, 0x0, "e1bba5d20ce57453ef107f5aaec6c9f1be34d3c1066970e55a8d68f13b5290a82271193bb7f1a9d671ead71fc41f23ba7ef69be274a03b2614b91e03c1fc0ec516680da755ed657a332ef2bf4ccd492452c56e33ed0e01cc14b87b97052a4f1789f05cafdc5dcdf916fc5417585f2f13c7105cce7a539944be634ea3950877aef1ad3a48ff2c79cca79b"}, {0x60, 0x10e, 0x5, "0f8648ef982705c17d7149ba291f9dcd613fc89ad22ac732ede46841a28036ef5bdd0e73c62f3608e18e92fe844178b679105fcb1795e37d0d01d644d25c08d0279e908262947606043d311c3f"}, {0x48, 0x10d, 0x9, "e2f11b8173312128a5f9b25f93b0bca74a1f2217b5634876188a6de9c340628e5bbaaf7e0465864fc4506310dcc33d4bc7e35d19a80b"}, {0x70, 0x1ff, 0xbd6, "4f8a74ff0cf081353fad085731632ccca97e96b1fd69601cab092bdfd2dc330ffdeab8c6ffef628cb6218370c781c60b066010e498607f34f29235185a7b27359c4a13092872e4a39f3fc73e14793676936f96f36c0a1f671cc3"}, {0x108, 0x112, 0x3, "0bd09c0f804ae3e573e58d4ede8c0d661ebc32c4ec92065acc2191a487fcfb8af6a1112dd829492d0b3c51032de27ba58b3a8f6eb28713b76b4abe9b037eb0c85f512eec9a4ac07b4200ca87daa6ba7ed322378d43d6c3e492dae5e6f075482ab423d05b05f6c27cfcfe9b3de897e53e65168a2d3d8b7677e02b7a3fec12398d42a47fb1fdeb0355d5520c2d7a60c252a66968f86a69775c75b06b9095a36898e626699944696d34a873d97c83abadb364c65f0806892ace0ffc52cadbf6c059e38528466728229599bfbdf0b98f8ad2e464b57cc7a0dd1f8d4ab7c93b34d1ea01d1648f7ffa2753ac0bd0580d634ec0191bbb158a17e703"}, {0xb0, 0x11f, 0x75, "52d7a824d30984e5704bd03d72092fb3bc0ae0144cc0fb751f89467d67290c851c381a94e3acd7e8c39a28292d40a18c3b50181389b0f5f8257f4ed1002aa8bfe3f9af493dc7b0f4d81ed68840bbcdb230ebe730ac65078d5a6a27266bdb84620423a00f0f13158cf4ec6b2d30bdf46ae166dce068cdd4994224fef46cc27e586fbd79c42d8bf00752034ac993ce8163d62950ffd768927a45f9eb5bffe07d60"}, {0xa0, 0x3a, 0x5, "2d774b7a4c5f4f2ae70a9eab51a765c35910c4aed449f126b2b513510f4ac6cc4968a8f684dd4418c322770854da35f44079b91268c17ca7f3c3f5ad0e6787f590eb3e94ac49a4065b5bcc0d703f424f5b691de1494a300047708b3b08e2c928f14fa8b4b4595caf50c160ead2f9e672266c53ae398af5bec36bf0f8e5217aaa121b7c95c2a534bbb883"}], 0x4f8}, 0x6}], 0x5, 0x40) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:21 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1001000000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f00000000c0)=0x3ffc000000000) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TIOCCONS(r0, 0x541d) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x4e22, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000fff00000000"], 0x14}}], 0x1, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) 02:14:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x80ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:21 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:21 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xaa, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:21 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(r0, &(0x7f00000001c0)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(r1, 0x0, 0x36d) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:21 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xaa, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfcffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:21 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x10000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:24 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:24 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xfffffffe, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000240)) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000032f0"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f00000000c0)=@default) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:24 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f00000003c0)='./bus/file0\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000001c0)=0x4) unlinkat(r0, &(0x7f00000000c0)='./bus\x00', 0x200) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:24 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xd700000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:24 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xf00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 1014.690217] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1014.709877] FAT-fs (loop4): Filesystem has been set read-only [ 1014.726971] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:27 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:27 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xa500, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:27 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000000c0)='./bus/file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xfffffde7}], 0x1008000, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:27 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x5a}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="9b3cb190a705c3b1e8ff44b26f90a64bd1756c3e797166ddb9d139055c33d313f52e971e6f3fd478a231aa85a739bc7b0e6c570746047a8157692751be2d0d5a36aaf50de332008d7dd36fadac9ded5a737243d3586bd3003798cc9f3eaf184bc856151a2cd3ac828830aaa94beb857a40a40d2275e3f5037530ca417fe05b19c0012235896239c35a53ff551db50a72c37f85634ab7340fd99cdc40559b099e74074a0a3310dda552fbad05388ef2666ad896fd6187d3e862b3cd9591247f308c68ab936531c9d0"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x60}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:27 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000240)) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000032f0"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f00000000c0)=@default) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1017.509341] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1017.524705] FAT-fs (loop0): Filesystem has been set read-only [ 1017.553586] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:30 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:30 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000003c0)={0xfffffffffffffffa, 0x100000001, 0x8, 0x45, 0x10, 0x6, 0x9, 0x6, 0x0, 0x1000}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000580)={r6, @in6={{0xa, 0x4e23, 0x0, @remote, 0x9}}, 0x0, 0x8}, 0x90) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) renameat(r0, &(0x7f0000000480)='./bus\x00', r1, &(0x7f0000000500)='./bus\x00') 02:14:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:30 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) ioctl$TIOCCBRK(r0, 0x5428) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000007c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x228, r3, 0xa01, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbb2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff001}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'erspan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xffffffffffffdcfa, @dev={0xfe, 0x80, [], 0x1d}, 0x7ff}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x1}, 0x20000041) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000440)={&(0x7f00000000c0)=[0x5], 0x1, 0x2, 0x2, 0x10001, 0x1, 0xfffffffffffffff8, {0x6, 0x2, 0x3, 0xfffffffffffffe18, 0x4, 0x2, 0x5, 0x5, 0x5, 0x4, 0x4, 0x0, 0x101, 0x3, "a7676db4cf666d2c47d157aace04c58f4056e44b278467be238685914f1e3828"}}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000880)={0x0, 0x100}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000900)={r4, 0x754, 0x6}, &(0x7f0000000940)=0x10) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:30 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0xcd000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:30 executing program 3: socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000000), 0x4) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) connect(r2, &(0x7f0000000080)=@un=@abs, 0x80) recvmmsg(r2, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) 02:14:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffffffffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1020.703501] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1020.731407] FAT-fs (loop4): Filesystem has been set read-only [ 1020.741919] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1020.777279] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1020.785984] FAT-fs (loop0): Filesystem has been set read-only [ 1020.800543] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfeffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c366440f56c9c4c27d794e0066420fe2e3f347aac442019dccd3195be1") ioctl$TIOCLINUX7(r1, 0x541c, 0x0) 02:14:33 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:33 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='9p\x00', 0x20000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@access_client='access=client'}, {@noextend='noextend'}, {@version_u='version=9p2000.u'}], [{@fsname={'fsname', 0x3d, 'security.capability\x00'}}, {@dont_hash='dont_hash'}, {@fsname={'fsname'}}]}}) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:33 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) r7 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r8 = getpid() sched_setattr(r8, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') sendmmsg$unix(r1, &(0x7f0000002600)=[{&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e07ffacec1b271fe2b", 0x9}, {&(0x7f0000000240)="558a5395b2f51191faf6b9d4fccbfd53e4e1850fea07cde4610688a52c54d26774a986b6901d2694b116e4c07b1b558e", 0x30}, {&(0x7f0000000600)="33a163f278026a5345447a7cc3caca38b99c0426f8868fd918aacc62778016d4bd4f2fa0abb97735ddac4a5e4aad029eda699d729f28ab9f69b3724c4a0c7c4f4c6876063e0fc2fbb1a97be2b54e68ffe05654890bb6ab94c8e183a2", 0x5c}], 0x3, &(0x7f0000000480)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18, 0x10}, {&(0x7f0000000680)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000700)="a688fa2fb4e95d69d36c46be690d254373201b4be4d9e308a905c2f9fd08f56f78895d7110a79b94a8f85996e14fbdc4eed431ff15d3240dba92fe0a09b35b4f7c3c0aaaa07d52adc46b911b9d325be58fdfd88127823ad07038b6a0143f522f824084fee5becec01bbcd8a82908d643c6a1a354c0ce14ae04e750e9cf78e12146603877293d48bd50bc24154df02aedb8f0428aff2a132479dc142e6f2c5582ee5a7d02e3d2a6c316b5a2a59c627d6e5c17c05ed3abf61648c8aa6d2d05", 0xbe}, {&(0x7f0000000880)="3ba156c0c127a308e8465b91d61c1f59051be33e70bc181d752efeadd91d3ff7f52e913c6c360e1d8ac9518ec02bb88751886a8cb96512fed607ca48bd218bc5b90fff59561d450e4a35a91d7533b812825d7f0615572aa8ef2f82d26957a679630daf54183bfeb17680e0eff444988aa1d4adc0f054ed895a4ba00957ce371c5e96af8af9e5d1508853d79b106b69", 0x8f}, {&(0x7f0000000940)="57933709fdf007a0f5ff5acdda3427a56b755b0b47fda3e82c3f55150d7c4a7ea1bc69ab774970f1e96c76e101b63df59a56edf3a92dd1e7a154eb34f8a087ef8e684af48ec52577fc4680f1e2a74c854c6b7f24e1e62c4d125a042286d879ae13b4d9e337be0c6f76a2685fd0533d9cd049da79db784e504f9a82d76cab38c258e6dee8bc541ecc06d7ad2caaf722624e85a162341b88c873432755e109c22ee72e40922f95ad63e1fc5a22a2399d2645b9bb5a11cc750ce576931b6b39c757e968f6c9bd6db9e99e5d8fc27ec58fd2aae77d1b", 0xd4}, {&(0x7f0000000a40)="ebe02b4e4b0df4e263ee06a8a247b45c0a48c27397ac6fc5452a854ddd59da3da2402b2adf644fac6d27778059137b0894b706eacf12f234778941f0a1dd6a37c50903249e40fa4f728a455864b54dc09ce53534c48d97d9bb8f4957fe546fa306d2392a3bcfd5e83c0a", 0x6a}, {&(0x7f0000000ac0)="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", 0x1000}], 0x5, &(0x7f0000000500)=[@rights={0x28, 0x1, 0x1, [r1, r1, r7, r1, r1, r0]}], 0x28, 0x4000800}, {&(0x7f0000001b40)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="075ee5a81c4d50f4fa6105d9f0d1510893de327e784529fb6e28a8ce67bf6a21dcdad32457cc5af240dba3aa26921c07415483df2572c7f66aba5e66c60edddc0693565443cbf6e84ba2754ed24a2cc27da1f80127fb1149aa5c65601cd225fafd5d40d0c173d498da803f20a19057a5176686407cae15ebe9b689bdf30bb0aad5ab28dd25d8eae3bb7a88e0f8244ded280d76ef8149b177241eac1986146467c32f53a3f692e461f2ce61a6c977b9c8f40f5c19e47a2440055d56d64bc79461b700766135f76c351f8272b2971629a9ec83e880f8125f73a7ed84256ebee64ab68b0e4358674ff405efdf980b416c887cbfd474", 0xf4}, {&(0x7f0000001cc0)="75a08cd01a1f768fd2742d43393b223ac1c8b02487d70b39e581e1b8426e1467982c1134cf563afa6ff5f973ca359d36a2d0a4b494a6816374c5f836f5cb614972c82722b96b2eff420f22cf1720288f604124245f1a7b73e53fe20162abf28a706cb359fd7f2443846e7ad1cd3b5a456810dc17fc758e321af5eb5ed46cca18f67e9a7658bd3fef", 0x88}, {&(0x7f0000001e40)="c6e8ca2e7e9174e4d877efe3a5d3be3ccd68edadc41eb7b73c8186a35abedb564806f2224ce7c4567964944c3f6a5becfb78449a47a7f8c3cad150ffc2bc42e6ead2d7a0fd81949942cf9affce24cd5ddc2b0c1d9e9234bd390b5b2210d3e5e5d3e37c35f05ec51bb05ddaa10ab9177e1dc8d8e3cac63bf0df8c0de85847dccee0175f4b36fa7b733d0eff8fa9922e6b7286491aaea10d3463", 0x99}, {&(0x7f00000007c0)="6040088097d2ffa2e7774088bc9706", 0xf}], 0x4, &(0x7f0000001f00)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r3, @ANYBLOB="00000000000090000000", @ANYRES32=r0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r3], 0x80, 0x4000000}, {&(0x7f0000001f80), 0x6e, &(0x7f00000020c0)=[{&(0x7f0000001dc0)="78eb5a9125e84cd34a9e86cdc0ab6714901034e49610c02d050eccb266d75fd3586f02036bf74329b69637b9463cc8", 0x2f}, {&(0x7f0000002000)="eb1933222738e46c62a8a5da22c9276681ed8be7371d5636db4ba9a3cff63b0204f701590cbc9e322fa81039e05bd4542d2dad147c713536713f08cee86a21145bbd44bc949d96a904c6b14c5639e8c591848c3c58d14988d593f16092a4cca87eb550cd2380e7fa5666b84dc4f1018fe45e158f64c5ae2a55edf96fbcba79c29abd65847f40c6d27427cd9cb646743acb6110f08245120567313e5134db9466429e15c08bec4ee3f733edf15cfc67f932179513970640e284c94122", 0xbc}], 0x2, &(0x7f0000002100)=[@cred={0x20, 0x1, 0x2, r8, r5, r6}, @cred={0x20, 0x1, 0x2, r8, r5, r6}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r3, r2, r3, r2]}, @rights={0x20, 0x1, 0x1, [r7, r3, r3, r1]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0xc0, 0x10}, {&(0x7f00000021c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002500)=[{&(0x7f0000002240)="bae3e266afa3643d805f6fe7a8c682f332410bc0658e0520d59ba1e488a3b8bfbe6fd0d9c51d48848b5d8c421c673a9d3297d47ec5d5bddaaa142289cc5fa611edd98352a56583a0755fcdd3bbcc6faa6b965ed486025c8c64c053129410c46dbda762", 0x63}, {&(0x7f00000022c0)="4023f4ee2c8bf35874f672f3cf669b1a8fd59c539d46923dfaed583a09d99e67d968541f7908952016c67597be977768e0ae7c65e57d1ca8f2b5b17e02aaec0bc5ba2d195d2c6d8974f72519872839ea4526734f63fa565fe69a764a7cb3f81ffcfc357ed9e20cd378c90338dd12ef445be2d4013a7b7cf382787fecd50c83bbe8ccd316ae1a13da2b857d71ad940d47d9d6e615580ad73c61c6bfe89764cae371589a218c0d83c8ed72ff77a0ce7fe2c68c7565cbd1904da1a5bc59a78daef0763c3d2bd17c2f324787b6fa72d4d1c7765441298fbbeb2da01af906ec01ab72ea3a4cdf4b93c8d42e8e7c0eeddf0fea22", 0xf1}, {&(0x7f00000023c0)="09d19a6c18c6e3545bef58", 0xb}, {&(0x7f0000002400)="5ead4929a585715712894fe193d0be64a4dce883f2aba538e87383b3c5b1a9f49a4b7df2348cacb6a7d1fda49604ec58a81bf2ed3063bdcc0dead289f9885862f38f6a4caf5bfa269146e5444901cb50a67cfd55605b7ad0f38c12b940cefddc2cb432e7c49782b671e17764fcff46554283cfd901614880f4c114f4fd29c9dcd7afb00666994ad55ac685e9f67423f53d057bc814c6dab9eef5adb05361499def119b8a1a0f12b3f8607b61ac365f45b3bf4db1", 0xb4}, {&(0x7f00000024c0)="1699709f", 0x4}], 0x5, &(0x7f0000002580)=[@cred={0x20, 0x1, 0x2, r8, r5, r6}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x30, 0x1, 0x1, [r1, r3, r3, r7, r3, r1, r1]}], 0x68, 0x2404c815}], 0x5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 02:14:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:33 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f00000000c0)) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x15) 02:14:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xe00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:33 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:33 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:34 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:34 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10c3f8ed01"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) ioctl$RTC_UIE_ON(r0, 0x7003) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) r5 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) ioctl$BLKROSET(r5, 0x125d, &(0x7f00000000c0)=0x2) 02:14:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:34 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:34 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x80000000011, r0, 0x0) 02:14:34 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="10941e0000bb6c62b3b882dab5657314d27e67836f048e04000000ff1e8370e165bd71598515cb231ab867d98ba34ac54c77fb3bde4ad61cc5105022e904"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x22, "a78029b0c922db2457c479700312591613676de1359e2e23d7625e8c14db4afa6b09"}, &(0x7f0000000240)=0x2a) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000003c0)={r2, 0x21a, 0x10}, &(0x7f0000000440)=0xc) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000480)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:34 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:34 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x8500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x60000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1024.690765] cgroup: fork rejected by pids controller in /syz5 [ 1025.039054] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1025.055102] FAT-fs (loop0): Filesystem has been set read-only [ 1025.061781] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:35 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e003, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:35 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:35 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000340)={'HL\x00'}, &(0x7f00000003c0)=0x1e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000140)={0x3, 0x4, 0x10000, 0x5}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x46) sched_setattr(r1, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x42, 0x0, 0xb, 0x2}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) listen(r2, 0x80001000) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:14:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1200}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1025.542315] FAT-fs (loop0): bogus number of reserved sectors 02:14:35 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200080}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x58, r2, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x540}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x81}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x4010) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:35 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xf}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2, @loopback}, 0xc) [ 1025.592021] FAT-fs (loop0): Can't find a valid FAT filesystem 02:14:36 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1026.250478] FAT-fs (loop0): bogus number of reserved sectors [ 1026.256441] FAT-fs (loop0): Can't find a valid FAT filesystem 02:14:36 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1ef700"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) unlink(&(0x7f00000004c0)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x100000000}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c0100c95c9c253f999f1880", @ANYRES16=r5, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x40801}, 0x81) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) r6 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fchdir(r6) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) [ 1026.299336] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1026.306853] FAT-fs (loop4): Filesystem has been set read-only [ 1026.313264] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:36 executing program 3: socketpair$unix(0x1, 0x8000000002, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002380)) 02:14:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1601}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:36 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) bind(r0, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x3, 0x2, 0x1, {0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}}, 0x80) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x6000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:36 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:36 executing program 3: 02:14:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1026.861043] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1026.897996] FAT-fs (loop4): Filesystem has been set read-only 02:14:37 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x4000000) write$UHID_INPUT2(r2, &(0x7f0000000580)={0xc, 0xd3, "fbbc1589089fb5382c2d1d961a710100832a6ba5df3d5a864c08be14013cf658e01ff396a4a296f62b8fa62cf77e4f9025952548eabc50b605bfe47eeb658fe03035d1a2e3b8d6ddba7dc6cdd9c299c5a1e85ad97523d4675d446927761e3faa2909b8c7f38fcaefa7109ad7a851d8ec10e4721a6897c41b5d5532ce0d0f1e7aeebd41528ac529cc75da0f48c423b201e5c660cc6f26089ab5ef4d72f6c306204d56158f730a118462041f569ca386a7ce2d2e37c0c85e07fc7caf94b19cddd084bc30361ccba16ba81ed5cb32621f74fed098"}, 0xd9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000680)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x1c, r6, 0xe04, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x80) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) 02:14:37 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:37 executing program 3: 02:14:37 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000440)) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r1, 0x0, 0x5, &(0x7f00000000c0)='eth0\x00', 0xffffffffffffffff}, 0x30) ptrace$getregs(0xe, r2, 0x6, &(0x7f00000003c0)=""/20) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffffffffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:37 executing program 3: 02:14:37 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:38 executing program 3: 02:14:38 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x60000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:38 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:38 executing program 3: 02:14:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x13000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:38 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:38 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file2\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:38 executing program 3: 02:14:38 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1601}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1028.436015] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1028.443435] FAT-fs (loop0): Filesystem has been set read-only [ 1028.455098] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:39 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) lsetxattr$security_selinux(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:load_policy_exec_t:s0\x00', 0x28, 0x3) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) 02:14:39 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x85}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:39 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28}, 0x28) 02:14:39 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:39 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed160000"], 0x5) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000001, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x80ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:39 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0xfffffffffffffffc, 0x0, 0x40}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') splice(0xffffffffffffffff, &(0x7f0000000040)=0x23, 0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) clone(0x80100100, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f0000000200)) write(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 02:14:39 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:40 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00'], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) clock_nanosleep(0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000240)) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(r0, 0x0, 0xffffffffffffff56) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, r3) 02:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:40 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000e40)={"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"}) 02:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:40 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xd65, &(0x7f00000006c0)=0x0) io_destroy(r0) [ 1030.122230] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1030.162534] FAT-fs (loop4): Filesystem has been set read-only [ 1030.179750] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:40 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="0268d5f0dba234a7a08e06000600755e7cf879726dff030000d9cfa55d5c3d7b92c50ed87b51df0dbf94f9dd9ea1de9506ac51822affba9e2c873be8", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000240)=0x1c) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="101e7140c9"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x40) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x80000, 0x0) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x4000000000000000) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) bind$rds(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x2) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000600)=""/196) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:40 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:40 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x94b, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') unshare(0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) [ 1030.880177] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1030.894314] FAT-fs (loop4): Filesystem has been set read-only [ 1030.902404] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:42 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) chdir(&(0x7f00000000c0)='./bus/file0\x00') perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:42 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1005000000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:42 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:42 executing program 3: syz_execute_func(&(0x7f0000000100)="3666440f50f56664400f9f3241c3c4e2c9975842c4c27dd34f008787420fe2e33e0f1110c442019dccd3196f") ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) 02:14:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c344ee9dc01497f542f542b0796e0266420fe2e33edb11aa6114f241d1e7d3196f") ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)=0x9fd9) 02:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x60}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:42 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), 0x8) 02:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:43 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="10ed1e56068886ef0e83630000"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f0000000500)=0x6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:43 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) getpeername$netrom(r2, &(0x7f0000000440)={{0x3, @bcast}, [@bcast, @rose, @default, @netrom, @rose, @netrom, @remote, @bcast]}, &(0x7f00000000c0)=0x48) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:43 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x20020102000007) sendfile(r0, r1, 0x0, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000380)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x15) 02:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:43 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf0ffffffffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:44 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1033.874982] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1033.888716] FAT-fs (loop0): Filesystem has been set read-only [ 1033.897067] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x80, 0x6, [0xfffffffffffffff7, 0x8, 0x80000001, 0x9, 0x1, 0x3]}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000580)={r1, @in={{0x2, 0x4e24, @loopback}}, [0x1, 0x2d, 0x380, 0x2, 0x6, 0xfffffffffffffc01, 0x6fa, 0x4c, 0x80, 0x1, 0x2, 0x7, 0x0, 0x7, 0x7]}, &(0x7f00000003c0)=0x100) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:44 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0x10, 0x3, 0xc) write(r1, &(0x7f0000000380)="130000001000ffdde200f49ff60f050000230a009d000000119dc53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd77dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000003400000000000000d5ba641663ac6847d35b8779c6903efd7800e86ccc2b5bbc156c2a1976a0f57350aeb0775fa06f769670fe98", 0xe8) 02:14:44 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(r2, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000000c0)=""/55) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) [ 1034.528665] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1034.554643] FAT-fs (loop0): Filesystem has been set read-only [ 1034.561146] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:44 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) waitid(0x3, r3, &(0x7f0000000580), 0xc, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000240)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) sched_rr_get_interval(r4, &(0x7f00000000c0)) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfcffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:45 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:45 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x6, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 02:14:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:45 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:45 executing program 3: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x0, "347e6e73603aae24409b475e34"}, 0xf, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000340)={'HL\x00'}, &(0x7f00000003c0)=0x1e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x3, 0x4, 0x10000, 0x5}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) listen(r2, 0x80001000) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:14:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3f00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:45 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1035.418143] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1035.436637] FAT-fs (loop0): Filesystem has been set read-only [ 1035.444986] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) shutdown(0xffffffffffffffff, 0x0) 02:14:45 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:45 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="07001e00203830b8ad8dddea59eb4619cec22d0f5d4f2341f212273802bb0949bfcab1b6ed0348e83ca8a243f15f0c005ddeb06cdfa3af1a32286ab8d853424006e2ff54cb55dcfa631a946dd66499ade234c09e432b3d4ce5cf7b3441b77560834360819cd63a339bcdfc"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$smack_current(r1, &(0x7f00000001c0)='!bdevmd5sumlouser#cpuset!\x00', 0x1a) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000580)={0x7fffffff, 0x0, [], {0x0, @reserved}}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) sendmsg$nl_netfilter(r0, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000880)={0x1230, 0xf, 0xf, 0x2, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x1}, [@generic="8d10c4aaa240a34f000a86c37c0663f40717776e238f4c76ead5592ebcd87d167fd91c8d13a3f8e2fb7a503f383d269bb2a8cb2c1f223dae0ee7f6a38c0bbddbe11688acfad572588b415c643c", @nested={0xb0, 0x67, [@typed={0x14, 0x64, @ipv6=@ipv4={[], [], @empty}}, @generic="95e64de4232ea6c0d2627cd931ea9e68fa7aeedfe4fc9c6b0a6673c9364a4bda38001f499a3d29b16523a1a8f255168a0e6504c532b5a5a53762196c", @generic="121b68dba71108137ddb2980041b382d7c0b56253f05277225723b8000d4cb2c2603e17bc5f0c3a2dc5c0be07dc8c2d36c5d7fd8aecd033af6aa4d015a5787d1a56825bfc47017f584e1dc394d3b8d112ef3a53e35404c6ebf6265dc"]}, @typed={0x14, 0x2b, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0xc, 0x49, @str='{em0\\\x00'}, @typed={0xc, 0x92, @u64=0x18000000}, @typed={0x8, 0x8, @ipv4=@dev={0xac, 0x14, 0x14, 0x2a}}, @nested={0xe4, 0x53, [@typed={0x8, 0x24, @ipv4=@rand_addr=0xff}, @generic="8e4937215ebf6193c2ff952fe626efd193fdf2f0d4cf2fb2a01a24fdc5a0fc36f829a4c74d22f76abcb173f3ee1d2a602c87f71cda1d45c651c2247d8043e6b846053898a4f903b7f667c20ef17ff2cc7454f43cd41c1f54bd510108a8b14c0d9a9f896ad2a70f12ba336f99294f77d2bcec3854d5a361c98ef3c5b0b05265fb2bf7fe30bd271ced8dbab85d6fd9f61ec6d75d7dbef9ccb57a5d5a099bd2fb7c615e39af0b6a37fad2599dff7d632028300bd1e31f17f4aa93cc3a1f5591c2c990eed5643cb1cb58e792504525399c57078cfe542143d4"]}, @typed={0x1004, 0x7b, @binary="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"}]}, 0x1230}, 0x1, 0x0, 0x0, 0x44005}, 0x20000000) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:45 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) shutdown(r0, 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:46 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, 0x0}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) shutdown(0xffffffffffffffff, 0x0) 02:14:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xe000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:46 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:14:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:46 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, 0x0}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) shutdown(0xffffffffffffffff, 0x0) 02:14:46 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 02:14:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x6000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:46 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 02:14:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:47 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000240)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) chdir(&(0x7f00000000c0)='./file2\x00') setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:47 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x0, "347e6e73603aae24409b475e34"}, 0xf, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000340)={'HL\x00'}, &(0x7f00000003c0)=0x1e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, 0x0}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000140)={0x3, 0x4, 0x10000}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) listen(r2, 0x80001000) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:14:47 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0x80000001) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:47 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 02:14:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:47 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 02:14:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x13}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x0, 0xffffffffffffff70, 0x0}) 02:14:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:47 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 02:14:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:47 executing program 3: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x0, "347e6e73603aae24409b475e34"}, 0xf, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000340)={'HL\x00'}, &(0x7f00000003c0)=0x1e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000140)={0x3, 0x4, 0x10000, 0x5}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) listen(r2, 0x80001000) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:14:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="10ed1e00000f32da38a220a11b0ac9be594e11703b0af26c2ed68e7f944b3cfa44f62aa3b2669e59eb93a592d2c1820377949dec77e52b7759540081c4db0b161d79d5ed2046760a7ee8c97865d4246bf40ed396be88c143b2fb66abcc6adcaee03ef65aeb3b509fbdf1a2f359634a5544c8db28ef291fef14e0f175619afc8ab0c0e94df4d9e0a075be65a64e081c5ae7a5e08dd34b1c5320c84d73e29160dedb510df4e52d25dbfb72a8a031b3ae7344126c43c0c0e7cf66e9cbccbf7d26a5a4653092c36d8e0937e23f199824c292cebc6e0ccdfbfc796457ba4ead462bf920a112"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000440)={r3, @dev={0xac, 0x14, 0x14, 0x10}, @empty}, 0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') io_setup(0x1, &(0x7f00000000c0)=0x0) io_pgetevents(r4, 0x8, 0x1, &(0x7f0000000480)=[{}], &(0x7f0000000500)={0x0, 0x1c9c380}, &(0x7f00000005c0)={&(0x7f0000000580), 0x8}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ftruncate(r2, 0x4f8) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:48 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000400400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f00000000c0)={0x7, 0x7fffffff, 0x744260cd, 0x3, 0x7, 0x8, 0x25, "6b06ede8ef8ba2d959c0fecd6dea62a0cb10a2ac", "77602833a6c0ff6e9176a076eccf5469f777b386"}) 02:14:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:48 executing program 3: 02:14:48 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 02:14:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfcffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:48 executing program 5: 02:14:48 executing program 3: 02:14:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:48 executing program 5: 02:14:48 executing program 3: [ 1038.479187] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1038.491998] FAT-fs (loop4): Filesystem has been set read-only [ 1038.500642] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1038.502179] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 1038.509351] FAT-fs (loop0): Filesystem has been set read-only [ 1038.521812] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:50 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000800000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:50 executing program 5: 02:14:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:50 executing program 3: 02:14:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x85000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:50 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x828200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)={0x80, r4, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}]}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:50 executing program 3: 02:14:50 executing program 5: 02:14:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:50 executing program 3: 02:14:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:50 executing program 5: 02:14:51 executing program 5: 02:14:51 executing program 3: 02:14:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1200}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) getpeername(r0, &(0x7f0000000440)=@pppoe, &(0x7f00000000c0)=0x80) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:51 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xc913af150b36f055, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:51 executing program 3: 02:14:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xe000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:51 executing program 5: 02:14:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x6000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:51 executing program 3: 02:14:51 executing program 5: 02:14:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:51 executing program 3: 02:14:51 executing program 5: syz_emit_ethernet(0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="50f2980118788e31"], 0x0) [ 1041.643161] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1041.651802] FAT-fs (loop0): Filesystem has been set read-only [ 1041.660108] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 02:14:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2c00) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000540)=""/250, 0x446a6e69) semctl$IPC_RMID(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:14:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="4f8121007d"], 0x5) ftruncate(r4, 0x2007fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x800000000024) 02:14:52 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000000c0)='./file1\x00'}, 0x10) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:52 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xc913af150b36f049, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000d677cafd1d92d944466045d866abb56d1eabb9359c6fe704b136681c09441f085cf374ab4c8ac0bc6f4a45d173329c5c7700bc1bfc6cf18bf71a7b038c1aa4fe7777553254dc6763c044eb59334b9217316e0fd8ca3553cc51982d545c"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000600)={0x0, @bt={0x100000001, 0x9, 0x1, 0x2, 0x7, 0x1, 0x4, 0x100, 0x1, 0x5, 0x6, 0x1ad7, 0xff, 0x1, 0x4, 0x2}}) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) [ 1042.238708] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1042.245536] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:14:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/84, 0x54}}], 0x1, 0x62, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') accept4(r3, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) [ 1042.321034] net_ratelimit: 2 callbacks suppressed [ 1042.321183] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1042.386758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=125 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1042.400310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1042.430528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 02:14:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x13}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1042.631839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 02:14:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback, @loopback}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) dup2(r0, r1) r2 = request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f0000000100)={'syz'}, 0x0, r2) 02:14:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1042.866943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1042.895525] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1042.957331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1043.061955] device lo entered promiscuous mode [ 1043.102620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1043.125855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1043.169684] device lo left promiscuous mode 02:14:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1043.201788] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16235 comm=syz-executor3 [ 1043.220025] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:14:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000500)='./file1\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) fsetxattr(r0, &(0x7f0000000240)=@known='com.apple.system.Security\x00', &(0x7f00000003c0)='/dev/ppp\x00', 0x9, 0x0) r4 = getpid() fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) prctl$PR_MCE_KILL_GET(0x22) r5 = creat(&(0x7f0000000100)='./file1\x00', 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000480)={0x7, 0xe89b, 0xffffffffffffff80, 0x401}, 0x10) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) [ 1043.305393] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 02:14:53 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) getpeername(r0, &(0x7f0000000440)=@pppoe, &(0x7f00000000c0)=0x80) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) [ 1043.355152] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1043.357386] FAT-fs (loop4): Filesystem has been set read-only 02:14:53 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="08001e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) sendto$netrom(r0, &(0x7f0000000440)="a22a1ff7731417851bfc4506ca3bd3a3884b816e021feaf6f20b219e0528b657ec05d3201db82b4be97049e3c6560928eb2578cb4e590248dcd6fa330768117dddd8f6d49a5793eec90182f1dfe4808bb40fd4832b8b8237be994e84", 0x5c, 0x0, &(0x7f0000000580)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1601000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="4f8121007d"], 0x5) ftruncate(r4, 0x2007fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x800000000024) 02:14:54 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) getpeername(r0, &(0x7f0000000440)=@pppoe, &(0x7f00000000c0)=0x80) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1043.808196] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:14:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x60000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1043.914828] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 02:14:54 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) getpeername(r0, &(0x7f0000000440)=@pppoe, &(0x7f00000000c0)=0x80) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:54 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="9a4cb675d97edf2bba29241431143ce5ed29ff6b2a8cc971ccfbda3db09904c00ad1707daab8ca74dd05f672a6918002a36d26b6"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000240)='/dev/ptmx\x00') ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000000c0)={0x5, 0xffffffffffffffc0, 0x6}) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000580)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000480), &(0x7f0000000500)) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="10ed1e0000bc6b142679d15ba23a974645b1b6a5cb2f5f6b9c0000d3d2aa01761c12a1c4f574a0b6a9"], 0x5) nanosleep(&(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_context(r2, &(0x7f0000000640)='system_u:object_r:xserver_misc_device_t:s0\x00', 0x2b) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="9a000004a471bff8f0bb5beabfc75524954cc9376155755a20aa09aaaf0184e16bd2d736fd1c713c8651dbae6bad1b3f8e656684878a443592e0e6378079b1320cca7991aad59e23f7ec45874eb58ec838675700040000000000008de9d0a7dff506ecbac85b06d273f46721ce7768fcaa86177c2619c52211622f962b4348fe231a91cd0ac5937dd34e2db4e4ae24b7f55b4a377dc06c1d40e85cf0c006"], &(0x7f00000003c0)=0xa2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000480)={r4}, &(0x7f0000000500)=0x8) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(r2, &(0x7f0000000440)={0xff44, 0x3ffffffffffffffc, 0x5, {0x5}}, 0xfffffffffffffefb) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:55 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000000c0)='./file1\x00'}, 0x10) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:55 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x80000000000007ff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000480)=[{&(0x7f0000000240)="07d2680f8b737d1444eab26f", 0xc, 0x2}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="10ed1de87f81dcac22baba4817983f705518244c1e794fa4588b35c8d2e7e88a52b48b25f5f202a7c0fca42d0862a2fc6a4269fc29d289a4fd2571665b9c88039a8af7c506eb3e4980d562d4ef7e0b5140e19f70a582585fc44c7e53fc01c9a17d591a09fa50371bd54757d08441257ff0333cfe8bb7134b32332150b285eb980f4b5c4a667c00000000000000000000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3d, 0x200000) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="10ed1e00000f32da38a220a11b0ac9be594e11703b0af26c2ed68e7f944b3cfa44f62aa3b2669e59eb93a592d2c1820377949dec77e52b7759540081c4db0b161d79d5ed2046760a7ee8c97865d4246bf40ed396be88c143b2fb66abcc6adcaee03ef65aeb3b509fbdf1a2f359634a5544c8db28ef291fef14e0f175619afc8ab0c0e94df4d9e0a075be65a64e081c5ae7a5e08dd34b1c5320c84d73e29160dedb510df4e52d25dbfb72a8a031b3ae7344126c43c0c0e7cf66e9cbccbf7d26a5a4653092c36d8e0937e23f199824c292cebc6e0ccdfbfc796457ba4ead462bf920a112"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000440)={r3, @dev={0xac, 0x14, 0x14, 0x10}, @empty}, 0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') io_setup(0x1, &(0x7f00000000c0)=0x0) io_pgetevents(r4, 0x8, 0x1, &(0x7f0000000480)=[{}], &(0x7f0000000500)={0x0, 0x1c9c380}, &(0x7f00000005c0)={&(0x7f0000000580), 0x8}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ftruncate(r2, 0x4f8) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="10ed1e00000f32da38a220a11b0ac9be594e11703b0af26c2ed68e7f944b3cfa44f62aa3b2669e59eb93a592d2c1820377949dec77e52b7759540081c4db0b161d79d5ed2046760a7ee8c97865d4246bf40ed396be88c143b2fb66abcc6adcaee03ef65aeb3b509fbdf1a2f359634a5544c8db28ef291fef14e0f175619afc8ab0c0e94df4d9e0a075be65a64e081c5ae7a5e08dd34b1c5320c84d73e29160dedb510df4e52d25dbfb72a8a031b3ae7344126c43c0c0e7cf66e9cbccbf7d26a5a4653092c36d8e0937e23f199824c292cebc6e0ccdfbfc796457ba4ead462bf920a112"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000440)={r3, @dev={0xac, 0x14, 0x14, 0x10}, @empty}, 0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') io_setup(0x1, &(0x7f00000000c0)=0x0) io_pgetevents(r4, 0x8, 0x1, &(0x7f0000000480)=[{}], &(0x7f0000000500)={0x0, 0x1c9c380}, &(0x7f00000005c0)={&(0x7f0000000580), 0x8}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ftruncate(r2, 0x4f8) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf0ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x8010) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="0d547f081003bc84b348dac7d94ed84b5b6e0646151b904f3fe9b210d184f2f7ecbfb67bd1c044d2a5ba1fe53796a2fb0837c9edbf31111ca7"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(r2, 0x4b32, 0x4000000000000004) sendfile(r2, r2, &(0x7f00000000c0), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x30, r3, 0x200, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x9, @bearer=@l2={'ib', 0x3a, 'hwsim0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8041}, 0x20000050) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) r4 = gettid() write$P9_RGETLOCK(r0, &(0x7f0000000500)={0x23, 0x37, 0x2, {0x2, 0x5b07, 0x100, r4, 0x5, 'wlan1'}}, 0x23) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfffffffffffff000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1046.129925] FAT-fs (loop0): bogus number of reserved sectors [ 1046.136148] FAT-fs (loop0): Can't find a valid FAT filesystem 02:14:56 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(r2, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000000c0)=""/55) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:56 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="10ed1e00000f32da38a220a11b0ac9be594e11703b0af26c2ed68e7f944b3cfa44f62aa3b2669e59eb93a592d2c1820377949dec77e52b7759540081c4db0b161d79d5ed2046760a7ee8c97865d4246bf40ed396be88c143b2fb66abcc6adcaee03ef65aeb3b509fbdf1a2f359634a5544c8db28ef291fef14e0f175619afc8ab0c0e94df4d9e0a075be65a64e081c5ae7a5e08dd34b1c5320c84d73e29160dedb510df4e52d25dbfb72a8a031b3ae7344126c43c0c0e7cf66e9cbccbf7d26a5a4653092c36d8e0937e23f199824c292cebc6e0ccdfbfc796457ba4ead462bf920a112"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000440)={r3, @dev={0xac, 0x14, 0x14, 0x10}, @empty}, 0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') io_setup(0x1, &(0x7f00000000c0)=0x0) io_pgetevents(r4, 0x8, 0x1, &(0x7f0000000480)=[{}], &(0x7f0000000500)={0x0, 0x1c9c380}, &(0x7f00000005c0)={&(0x7f0000000580), 0x8}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ftruncate(r2, 0x4f8) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:56 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3f00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:56 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x80, 0x6, [0xfffffffffffffff7, 0x8, 0x80000001, 0x9, 0x1, 0x3]}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000580)={r1, @in={{0x2, 0x4e24, @loopback}}, [0x1, 0x2d, 0x380, 0x2, 0x6, 0xfffffffffffffc01, 0x6fa, 0x4c, 0x80, 0x1, 0x2, 0x7, 0x0, 0x7, 0x7]}, &(0x7f00000003c0)=0x100) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:57 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) r2 = add_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r2, 0x2) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)) 02:14:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:57 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @dev}, &(0x7f0000000240)=0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:57 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x80, 0x6, [0xfffffffffffffff7, 0x8, 0x80000001, 0x9, 0x1, 0x3]}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000580)={r1, @in={{0x2, 0x4e24, @loopback}}, [0x1, 0x2d, 0x380, 0x2, 0x6, 0xfffffffffffffc01, 0x6fa, 0x4c, 0x80, 0x1, 0x2, 0x7, 0x0, 0x7, 0x7]}, &(0x7f00000003c0)=0x100) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:57 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) getpeername$netrom(r2, &(0x7f0000000440)={{0x3, @bcast}, [@bcast, @rose, @default, @netrom, @rose, @netrom, @remote, @bcast]}, &(0x7f00000000c0)=0x48) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:14:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:57 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x80, 0x6, [0xfffffffffffffff7, 0x8, 0x80000001, 0x9, 0x1, 0x3]}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000580)={r1, @in={{0x2, 0x4e24, @loopback}}, [0x1, 0x2d, 0x380, 0x2, 0x6, 0xfffffffffffffc01, 0x6fa, 0x4c, 0x80, 0x1, 0x2, 0x7, 0x0, 0x7, 0x7]}, &(0x7f00000003c0)=0x100) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) 02:14:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x8500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x80ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) chdir(&(0x7f00000000c0)='./bus/file0\x00') perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3f00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:58 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x1ffe0000000000, 0x6, &(0x7f0000000a40)=[{&(0x7f0000000580)="6232e02c605f66fe42e8f6259c559219a64dae0691f873b01f0658a07b2b9b04a95e7b700682f9ebe1cf728ef1ecfd464a349d538c3db953bea979f63f3686a39ac3626767efdc000681abf0ee0815d2272a113ab6def679bb9669ebec4814990816eca847c8cccae89fbf07364eac230545498ccf2794d6caf3f4fd91b99a1f48ee3988f690059989b69644c02683b35bb530fcd3b283af944b8276660f853a5f4d16691d4f52a0fb", 0xa9, 0x5}, {&(0x7f00000003c0)="28f7a63a405a1485f4aab3530db1d2b4ade75a84ec439a320e7a425466ef42bd2dc82f583b1eb1aaf9f2bc49f8d81df3ae26560513", 0x35, 0x100000001}, {&(0x7f0000000640)="fa681ac7757c2fa21d219affb49e67539ff3a32a3a3acddaed6b3cd1c9511cc047f2985599946fe27e27d539a9c08ddafaf588fa71c567c93a52c6cc2dba88db18e8d54903e9bd25a3cae4edd644f6007771c35e788806fc55e20a1b6331b02d9db49fd410329b382cb38ece45c0523cddd43d714ddee85b5c97a00e0a6ee9b4b3367fd3", 0x84, 0x4}, {&(0x7f0000000700)="3045b05dd3ec50afd54ae338c749c47bc636831c02c41bfbf410f4423ea89dd8fa0cae690d44fd02ff0ebb329b846b981f9e36018b04783d070d120e4a58b442f78bb601b73579bfccf5cc0c47807ea82088774b7f182e5035eaf50fe309a11d4dc4c22ac8c3323c38197039db8e562d51528196662c1af578c7d45e2dc6a83faa82acdf6d547eaa3f70f46c63df1bac521300d19b75efa52815d249183738d2b84c5bfa8e37", 0xa6, 0x9}, {&(0x7f0000000880)="b75cb1eaf49cf0578ab4210144bda65a62637ac4def1ab1f8662b399ae3129d8c831d8f1d428407d7decadd81b9e8a211c364e1a6ba49bb8d7ffe68000719202366e9b84f3e115e5558421eb78ded65c0b7c9ef9af869a84b95c94fa447377fdbdcbc518bf369c5b1a36844c28d720f11b086df5bd76baa2a55fde5e5c78e31f3eae1f84eafab67ee06c27143ac49a28153f01010b8a7e15250d8f29af55dada15415302ffc205adda3bbe0859c4f3a01d4b729d1e1a31e59e601c8abee085147d9357b39285e9ae7c1ee76c35ed22bc8b23a2afc8b8901ca18b670be2e424b0cec1c8b3423db885a27d76507ab04e81", 0xf0, 0x7}, {&(0x7f0000000980)="a34f22d600ad0116e44a46b3150db24a3d4c646277caedab3d9bb14e6d33ed750e4b38da77065779544ad6ca515cf475a588a0292915ded446fa63318c8f3b7cdf702016e712e879788d5908186c8864e2aa6f558015705310290ca7454481bc0fdade7f92b1e0a810afd249ccb33761b26d8ea697e301981bc7a1b99c5db63714ccde95fdd42fd376d42523d0266ea358564533ef90f8b00fd2cc7c64443d3693521ddd75f2231ff6c0b64e0c70f53f314c", 0xb2, 0x239}], 0x320001, &(0x7f0000000b00)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}], [{@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, 'em1%selinuxposix_acl_accessvboxnet0.-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/ptmx\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/full\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, '.'}}]}) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) chdir(&(0x7f00000000c0)='./bus/file0\x00') perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:58 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x80082, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x40000, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:58 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00'], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) clock_nanosleep(0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000240)) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(r0, 0x0, 0xffffffffffffff56) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, r3) 02:14:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xe00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) chdir(&(0x7f00000000c0)='./bus/file0\x00') perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:14:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x60}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed160000"], 0x5) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000001, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:14:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:14:59 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x22}, 0x6}}, 0x24) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) 02:14:59 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file2\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:15:00 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="eb3c906d6b66732e6676585326b698a7eb4061740002", 0xfffffffffffffe4e}], 0x100000000000000, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:15:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed160000"], 0x5) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000001, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:15:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xf0ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfcffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed160000"], 0x5) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000001, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:15:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x16010000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:00 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x4000000) write$UHID_INPUT2(r2, &(0x7f0000000580)={0xc, 0xd3, "fbbc1589089fb5382c2d1d961a710100832a6ba5df3d5a864c08be14013cf658e01ff396a4a296f62b8fa62cf77e4f9025952548eabc50b605bfe47eeb658fe03035d1a2e3b8d6ddba7dc6cdd9c299c5a1e85ad97523d4675d446927761e3faa2909b8c7f38fcaefa7109ad7a851d8ec10e4721a6897c41b5d5532ce0d0f1e7aeebd41528ac529cc75da0f48c423b201e5c660cc6f26089ab5ef4d72f6c306204d56158f730a118462041f569ca386a7ce2d2e37c0c85e07fc7caf94b19cddd084bc30361ccba16ba81ed5cb32621f74fed098"}, 0xd9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000680)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x1c, r6, 0xe04, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x80) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) 02:15:01 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:15:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x80ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:01 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file2\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:15:01 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x4000000) write$UHID_INPUT2(r2, &(0x7f0000000580)={0xc, 0xd3, "fbbc1589089fb5382c2d1d961a710100832a6ba5df3d5a864c08be14013cf658e01ff396a4a296f62b8fa62cf77e4f9025952548eabc50b605bfe47eeb658fe03035d1a2e3b8d6ddba7dc6cdd9c299c5a1e85ad97523d4675d446927761e3faa2909b8c7f38fcaefa7109ad7a851d8ec10e4721a6897c41b5d5532ce0d0f1e7aeebd41528ac529cc75da0f48c423b201e5c660cc6f26089ab5ef4d72f6c306204d56158f730a118462041f569ca386a7ce2d2e37c0c85e07fc7caf94b19cddd084bc30361ccba16ba81ed5cb32621f74fed098"}, 0xd9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000680)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x1c, r6, 0xe04, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x80) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) 02:15:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:01 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="10760bde35e224ebf9c66d4f5500"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000003c0)=0x7fff) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000240)=0x4) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:15:01 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x4000000) write$UHID_INPUT2(r2, &(0x7f0000000580)={0xc, 0xd3, "fbbc1589089fb5382c2d1d961a710100832a6ba5df3d5a864c08be14013cf658e01ff396a4a296f62b8fa62cf77e4f9025952548eabc50b605bfe47eeb658fe03035d1a2e3b8d6ddba7dc6cdd9c299c5a1e85ad97523d4675d446927761e3faa2909b8c7f38fcaefa7109ad7a851d8ec10e4721a6897c41b5d5532ce0d0f1e7aeebd41528ac529cc75da0f48c423b201e5c660cc6f26089ab5ef4d72f6c306204d56158f730a118462041f569ca386a7ce2d2e37c0c85e07fc7caf94b19cddd084bc30361ccba16ba81ed5cb32621f74fed098"}, 0xd9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) r5 = getpid() sched_setattr(r5, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000680)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x1c, r6, 0xe04, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x80) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)) 02:15:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:02 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000e9bd63751e07bda46200df69acf4465a228c1874095653c87f2b725faffd920a79f88ee09f256f95b0e49096d530d04fb7b02883d639e00d82a745d28ece1fdcddc254e0f75a6440042614a517f7b2a462205ddcd1da795e1874739ad39358bac1909de629254fca64df6aa1240841caf8cb45bdb913b81670f1ce29bd6aa33010261419722f146809d53ee5f82c57f4d26a0ac0545d3578cb5a7f"], 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, 0x3, 0x7, 0x3}, 0xfffffffffffffffc) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 02:15:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e003, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:15:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xfcffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1052.223272] FAT-fs (loop5): bogus number of reserved sectors [ 1052.244921] FAT-fs (loop5): Can't find a valid FAT filesystem 02:15:02 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file2\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:15:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e003, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:15:03 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = gettid() sched_getattr(r2, &(0x7f0000000240), 0x30, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="5165b28260a2d85087a2a39100ded37f0e53cdf726d7a117a247b2833f11747a1a0c780206728e4a6eda40a04659f9402b79d7b6d573d2acf7fcd2b8fffd4b50882a18a02000040000d4898026fb6b49bcd49b5915732c39faa241b783292168c6652b5500f8b1371992577b0e7a4665baf09e66c8f95fd306f409a262247ae666ac73218d"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r3, &(0x7f0000000400)='./bus/file0\x00', 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x2, 0x6}}) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f00000001c0)='./file1\x00') r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000180)) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) bind$bt_sco(r4, &(0x7f00000003c0)={0x1f, {0x6, 0x3f, 0xfffffffffffffffe, 0x8, 0x5, 0x1}}, 0x8) 02:15:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x3d2976bc97}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:03 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYRES64=r0], 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r2, &(0x7f0000000400)='./bus/file0\x00', 0x0) r4 = getpid() sched_setattr(r4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)) [ 1052.927579] FAT-fs (loop5): bogus number of reserved sectors [ 1052.953527] FAT-fs (loop5): Can't find a valid FAT filesystem 02:15:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e003, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x10001}]}, 0xc, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)) 02:15:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x116}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 02:15:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc913af150b36f045, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x801, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10ed1e0000"], 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x2d00000000000000, 0x8080fffffffe) unlinkat(r1, &(0x7f0000000400)='./bus/file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x8}}, 0x18) rmdir(&(0x7f0000000180)='./file0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000000400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) 02:15:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0xb, &(0x7f00000daff0)={&(0x7f0000000040)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x4312fae5e6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) [ 1159.014458] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1159.020742] rcu: (detected by 1, t=10502 jiffies, g=150269, q=38) [ 1159.027070] rcu: All QSes seen, last rcu_preempt kthread activity 10499 (4295053052-4295042553), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 1159.039720] syz-executor0 R running task 21168 16856 8198 0x00000000 [ 1159.046917] Call Trace: [ 1159.049501] [ 1159.051655] sched_show_task.cold.86+0x2b6/0x30a [ 1159.056420] ? can_nice.part.74+0x20/0x20 [ 1159.060574] ? vprintk_default+0x28/0x30 [ 1159.064691] ? vprintk_func+0x85/0x181 [ 1159.068579] ? vprintk_func+0x85/0x181 [ 1159.072480] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1159.077235] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1159.082003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.087550] print_other_cpu_stall.cold.69+0x80e/0x8db [ 1159.092831] ? print_usage_bug+0xc0/0xc0 [ 1159.096899] ? print_cpu_stall+0x190/0x190 [ 1159.101139] ? __lock_acquire+0x62f/0x4c20 [ 1159.105390] ? graph_lock+0x270/0x270 [ 1159.109199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.114739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.120283] ? do_trace_rcu_torture_read+0x10/0x10 [ 1159.125225] ? __this_cpu_preempt_check+0x1c/0x20 [ 1159.130069] ? rcu_preempt_need_deferred_qs+0x71/0x190 [ 1159.135344] ? __lock_is_held+0xb5/0x140 [ 1159.139413] ? __rcu_read_lock+0x90/0x90 [ 1159.143477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.149015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.154555] ? check_preemption_disabled+0x48/0x280 [ 1159.159586] rcu_check_callbacks+0xfe8/0x1410 [ 1159.164084] ? rcutree_dead_cpu+0x10/0x10 [ 1159.168234] ? lock_downgrade+0x900/0x900 [ 1159.172390] ? lock_release+0x910/0xa00 [ 1159.176374] ? graph_lock+0x270/0x270 [ 1159.180178] ? graph_lock+0x270/0x270 [ 1159.183984] ? graph_lock+0x270/0x270 [ 1159.187791] ? graph_lock+0x270/0x270 [ 1159.191593] ? find_held_lock+0x36/0x1c0 [ 1159.195665] ? cpuacct_account_field+0x219/0x3d0 [ 1159.200424] ? graph_lock+0x270/0x270 [ 1159.204224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1159.209766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.215308] ? check_preemption_disabled+0x48/0x280 [ 1159.220335] ? trace_hardirqs_off+0xb8/0x310 [ 1159.224749] ? __lock_is_held+0xb5/0x140 [ 1159.228812] ? trace_hardirqs_on+0x310/0x310 [ 1159.233223] ? check_preemption_disabled+0x48/0x280 [ 1159.238253] ? raise_softirq+0x199/0x420 [ 1159.242319] ? raise_softirq_irqoff+0x2e0/0x2e0 [ 1159.246990] ? account_system_index_time+0x333/0x5d0 [ 1159.252406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.257954] ? check_preemption_disabled+0x48/0x280 [ 1159.262995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1159.268535] ? hrtimer_run_queues+0x9a/0x400 [ 1159.273031] ? run_local_timers+0x19b/0x230 [ 1159.277363] ? timer_clear_idle+0x90/0x90 [ 1159.281516] ? irqtime_account_process_tick.isra.6+0x35b/0x490 [ 1159.287504] ? account_process_tick+0x282/0x350 [ 1159.292180] update_process_times+0x2d/0x70 [ 1159.296567] tick_sched_handle+0x9f/0x180 [ 1159.300720] tick_sched_timer+0x45/0x130 [ 1159.304893] __hrtimer_run_queues+0x41c/0x10d0 [ 1159.309485] ? tick_sched_do_timer+0x1a0/0x1a0 [ 1159.314074] ? hrtimer_start_range_ns+0xe00/0xe00 [ 1159.318927] ? pvclock_read_flags+0x160/0x160 [ 1159.323426] ? trace_hardirqs_on+0x310/0x310 [ 1159.327887] ? kvm_clock_read+0x18/0x30 [ 1159.331866] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1159.336883] ? ktime_get_update_offsets_now+0x3b3/0x540 [ 1159.342254] ? do_timer+0x50/0x50 [ 1159.345711] ? rwlock_bug.part.2+0x90/0x90 [ 1159.349951] ? trace_hardirqs_on+0x310/0x310 [ 1159.354367] ? rcu_softirq_qs+0x20/0x20 [ 1159.358363] hrtimer_interrupt+0x313/0x780 [ 1159.362620] smp_apic_timer_interrupt+0x1a1/0x760 [ 1159.367466] ? smp_reschedule_interrupt+0x109/0x650 [ 1159.372483] ? smp_call_function_single_interrupt+0x650/0x650 [ 1159.378379] ? interrupt_entry+0xb5/0xc0 [ 1159.382442] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1159.387461] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1159.392482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1159.397323] ? trace_hardirqs_on_caller+0x310/0x310 [ 1159.402351] ? trace_hardirqs_on_caller+0x310/0x310 [ 1159.407378] ? task_prio+0x50/0x50 [ 1159.410923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.416469] ? check_preemption_disabled+0x48/0x280 [ 1159.421967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1159.426819] apic_timer_interrupt+0xf/0x20 [ 1159.431045] [ 1159.433287] RIP: 0010:check_memory_region+0x1f/0x1b0 [ 1159.438395] Code: 00 66 2e 0f 1f 84 00 00 00 00 00 48 85 f6 0f 84 3c 01 00 00 48 b8 ff ff ff ff ff 7f ff ff 55 0f b6 d2 48 39 c7 48 89 e5 41 55 <41> 54 53 0f 86 11 01 00 00 4c 8d 5c 37 ff 48 89 fb 49 b9 00 00 00 [ 1159.457395] RSP: 0018:ffff888096236990 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 1159.465119] RAX: ffff7fffffffffff RBX: 0000000000000003 RCX: ffffffff81a03375 [ 1159.472384] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888096236a28 [ 1159.479651] RBP: ffff888096236998 R08: fffff940003e984f R09: fffff940003e984e [ 1159.486918] R10: fffff940003e984e R11: ffffea0001f4c277 R12: ffff888096236d48 [ 1159.494193] R13: 0000000000000004 R14: ffffed1012c46d45 R15: dffffc0000000000 [ 1159.501478] ? find_get_entry+0x5c5/0x1120 [ 1159.505739] kasan_check_read+0x11/0x20 [ 1159.509711] find_get_entry+0x5c5/0x1120 [ 1159.513781] ? filemap_map_pages+0x1d20/0x1d20 [ 1159.518376] ? arch_local_save_flags+0x40/0x40 [ 1159.522971] ? __lock_acquire+0x62f/0x4c20 [ 1159.527214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1159.532759] ? mark_held_locks+0x130/0x130 [ 1159.537069] ? ext4_mark_inode_dirty+0x266/0xb20 [ 1159.541829] ? ext4_dirty_inode+0x97/0xc0 [ 1159.545977] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 1159.550908] ? __might_sleep+0x95/0x190 [ 1159.554889] ? graph_lock+0x270/0x270 [ 1159.558697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.564236] ? check_preemption_disabled+0x48/0x280 [ 1159.569258] ? __lock_is_held+0xb5/0x140 [ 1159.573321] ? graph_lock+0x270/0x270 [ 1159.577134] pagecache_get_page+0x12f/0xf00 [ 1159.581465] ? __radix_tree_lookup+0x3b6/0x510 [ 1159.586055] ? find_get_pages_contig+0x18d0/0x18d0 [ 1159.590985] ? find_held_lock+0x36/0x1c0 [ 1159.595055] ? balance_dirty_pages_ratelimited+0x71e/0x23c0 [ 1159.600776] ? lock_downgrade+0x900/0x900 [ 1159.604933] ? check_preemption_disabled+0x48/0x280 [ 1159.609953] ? graph_lock+0x270/0x270 [ 1159.613753] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1159.619036] ? rcu_softirq_qs+0x20/0x20 [ 1159.623012] ? rcu_read_unlock_special+0x370/0x370 [ 1159.627943] ? print_usage_bug+0xc0/0xc0 [ 1159.632012] ? check_preemption_disabled+0x48/0x280 [ 1159.637030] ? __lock_is_held+0xb5/0x140 [ 1159.641104] ? ___might_sleep+0x1ed/0x300 [ 1159.645254] ? arch_local_save_flags+0x40/0x40 [ 1159.649893] ? remove_inode_buffers+0x3f0/0x3f0 [ 1159.654565] ? block_write_end+0xab/0x230 [ 1159.658722] generic_file_read_iter+0xa13/0x2d70 [ 1159.663496] ? filemap_write_and_wait_range+0xd0/0xd0 [ 1159.668683] ? print_usage_bug+0xc0/0xc0 [ 1159.672771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.678307] ? iov_iter_advance+0x306/0x13f0 [ 1159.682722] ? graph_lock+0x270/0x270 [ 1159.686537] ? __lock_acquire+0x62f/0x4c20 [ 1159.690771] ? graph_lock+0x270/0x270 [ 1159.694571] ? find_held_lock+0x36/0x1c0 [ 1159.698647] ? find_held_lock+0x36/0x1c0 [ 1159.702720] ? is_bpf_text_address+0xac/0x170 [ 1159.707217] ? lock_downgrade+0x900/0x900 [ 1159.711369] ? check_preemption_disabled+0x48/0x280 [ 1159.716393] ? kasan_check_read+0x11/0x20 [ 1159.720546] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1159.725825] ? rcu_read_unlock_special+0x370/0x370 [ 1159.730755] ? rcu_softirq_qs+0x20/0x20 [ 1159.734727] ? unwind_dump+0x190/0x190 [ 1159.738623] ? is_bpf_text_address+0xd3/0x170 [ 1159.743122] ? kernel_text_address+0x79/0xf0 [ 1159.747537] ? __kernel_text_address+0xd/0x40 [ 1159.752038] ? unwind_get_return_address+0x61/0xa0 [ 1159.756977] ? __save_stack_trace+0x8d/0xf0 [ 1159.761324] ? save_stack+0xa9/0xd0 [ 1159.764955] ? save_stack+0x43/0xd0 [ 1159.768581] ? __kasan_slab_free+0x102/0x150 [ 1159.772991] ? kasan_slab_free+0xe/0x10 [ 1159.776971] ? kfree+0xcf/0x230 [ 1159.780250] ? print_usage_bug+0xc0/0xc0 [ 1159.784326] ? do_splice_direct+0x2d4/0x420 [ 1159.788649] ? do_sendfile+0x62a/0xe50 [ 1159.792541] ? __x64_sys_sendfile64+0x15d/0x250 [ 1159.797212] ? do_syscall_64+0x1b9/0x820 [ 1159.801280] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.806654] ? trace_hardirqs_off+0xb8/0x310 [ 1159.811059] ? kasan_check_read+0x11/0x20 [ 1159.815206] ? do_raw_spin_unlock+0xa7/0x330 [ 1159.819612] ? trace_hardirqs_on+0x310/0x310 [ 1159.824038] ? graph_lock+0x270/0x270 [ 1159.827850] ? mark_held_locks+0xc7/0x130 [ 1159.831997] ? kfree+0x107/0x230 [ 1159.835360] ? kfree+0x107/0x230 [ 1159.838730] ? __lock_is_held+0xb5/0x140 [ 1159.842805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.848343] ? fsnotify+0x50e/0xef0 [ 1159.851968] ? ___might_sleep+0x1ed/0x300 [ 1159.856124] ext4_file_read_iter+0x18b/0x3c0 [ 1159.860542] generic_file_splice_read+0x62c/0xa60 [ 1159.865385] ? add_to_pipe+0x360/0x360 [ 1159.869285] ? rw_verify_area+0x118/0x360 [ 1159.873444] ? add_to_pipe+0x360/0x360 [ 1159.877344] do_splice_to+0x12e/0x190 [ 1159.881158] splice_direct_to_actor+0x31c/0x9d0 [ 1159.885834] ? pipe_to_sendpage+0x400/0x400 [ 1159.890166] ? do_splice_to+0x190/0x190 [ 1159.894144] ? rw_verify_area+0x118/0x360 [ 1159.898298] do_splice_direct+0x2d4/0x420 [ 1159.902461] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1159.907319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.912860] ? __sb_start_write+0x1b2/0x370 [ 1159.917185] do_sendfile+0x62a/0xe50 [ 1159.920917] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1159.925513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1159.931053] ? _copy_from_user+0xdf/0x150 [ 1159.935207] __x64_sys_sendfile64+0x15d/0x250 [ 1159.939704] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1159.944288] ? do_syscall_64+0x2c7/0x820 [ 1159.948364] do_syscall_64+0x1b9/0x820 [ 1159.952250] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1159.957613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1159.962544] ? trace_hardirqs_on_caller+0x310/0x310 [ 1159.967558] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1159.972571] ? recalc_sigpending_tsk+0x180/0x180 [ 1159.977332] ? __switch_to_asm+0x40/0x70 [ 1159.981396] ? __switch_to_asm+0x34/0x70 [ 1159.985461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1159.990323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.995508] RIP: 0033:0x457ec9 [ 1159.998699] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1160.017596] RSP: 002b:00007f835af62c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1160.025309] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 1160.032573] RDX: 0000000020000000 RSI: 000000000000000d RDI: 000000000000000d [ 1160.039850] RBP: 000000000073c180 R08: 0000000000000000 R09: 0000000000000000 [ 1160.047119] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f835af636d4 [ 1160.054392] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 00000000ffffffff [ 1160.061704] rcu: rcu_preempt kthread starved for 10499 jiffies! g150269 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 1160.072269] rcu: RCU grace-period kthread stack dump: [ 1160.077456] rcu_preempt R running task 22280 10 2 0x80000000 [ 1160.084649] Call Trace: [ 1160.087237] __schedule+0x86c/0x1ed0 [ 1160.090950] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1160.096060] ? __sched_text_start+0x8/0x8 [ 1160.100214] ? add_timer_on+0x9f0/0x9f0 [ 1160.104193] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1160.109305] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1160.114420] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1160.119003] ? trace_hardirqs_on+0xbd/0x310 [ 1160.123327] ? kasan_check_read+0x11/0x20 [ 1160.127478] ? prepare_to_swait_event+0x25a/0x800 [ 1160.132324] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1160.137783] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1160.142891] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1160.148002] schedule+0xef/0x370 [ 1160.151373] ? __schedule+0x1ed0/0x1ed0 [ 1160.155346] ? __init_swait_queue_head+0x150/0x150 [ 1160.160299] schedule_timeout+0x140/0x260 [ 1160.164448] ? usleep_range+0x1a0/0x1a0 [ 1160.168425] ? __next_timer_interrupt+0x1a0/0x1a0 [ 1160.173280] rcu_gp_fqs_loop+0x762/0xa80 [ 1160.177357] ? rcu_gp_fqs_check_wake+0x170/0x170 [ 1160.182115] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1160.187570] ? arch_local_save_flags+0x40/0x40 [ 1160.192156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1160.197697] ? rcu_gp_init+0x7f3/0x1270 [ 1160.201680] ? rcu_qs+0x110/0x110 [ 1160.205132] ? rcu_accelerate_cbs+0x562/0xae0 [ 1160.209624] ? graph_lock+0x270/0x270 [ 1160.213427] ? graph_lock+0x270/0x270 [ 1160.217241] ? __lock_is_held+0xb5/0x140 [ 1160.221312] ? __lock_is_held+0xb5/0x140 [ 1160.225372] ? graph_lock+0x270/0x270 [ 1160.229177] ? rcu_accelerate_cbs+0x562/0xae0 [ 1160.233681] ? find_held_lock+0x36/0x1c0 [ 1160.237748] ? rcu_gp_kthread+0x8d6/0xc70 [ 1160.241899] ? _raw_spin_unlock_irq+0x27/0x80 [ 1160.246391] ? _raw_spin_unlock_irq+0x27/0x80 [ 1160.250911] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1160.255495] ? trace_hardirqs_on+0xbd/0x310 [ 1160.259814] ? kasan_check_read+0x11/0x20 [ 1160.263968] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1160.269417] ? arch_local_save_flags+0x40/0x40 [ 1160.274002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1160.279550] rcu_gp_kthread+0x341/0xc70 [ 1160.283532] ? rcu_gp_init+0x1270/0x1270 [ 1160.287680] ? mark_held_locks+0x130/0x130 [ 1160.291921] ? __schedule+0x150b/0x1ed0 [ 1160.295903] ? _raw_spin_unlock_irq+0x27/0x80 [ 1160.300397] ? _raw_spin_unlock_irq+0x27/0x80 [ 1160.304899] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1160.309483] ? trace_hardirqs_on+0xbd/0x310 [ 1160.313802] ? kasan_check_read+0x11/0x20 [ 1160.317946] ? __schedule+0x150b/0x1ed0 [ 1160.321924] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1160.327370] ? lock_repin_lock+0x430/0x430 [ 1160.331623] ? _raw_spin_unlock_irq+0x60/0x80 [ 1160.336115] ? __schedule+0x150b/0x1ed0 [ 1160.340185] ? mutex_remove_waiter+0x321/0x720 [ 1160.344772] ? __sched_text_start+0x8/0x8 [ 1160.348915] ? __sched_text_start+0x8/0x8 [ 1160.353075] ? find_held_lock+0x36/0x1c0 [ 1160.357147] ? __kthread_parkme+0xce/0x1a0 [ 1160.361382] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1160.366486] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1160.371589] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1160.376175] ? trace_hardirqs_on+0xbd/0x310 [ 1160.380494] ? kasan_check_read+0x11/0x20 [ 1160.384644] ? __kthread_parkme+0xce/0x1a0 [ 1160.388882] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1160.394334] ? __schedule+0x1ed0/0x1ed0 [ 1160.398315] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1160.403421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1160.408954] ? __kthread_parkme+0xfb/0x1a0 [ 1160.413195] ? rcu_gp_init+0x1270/0x1270 [ 1160.417256] kthread+0x35a/0x440 2018/12/31 02:16:50 Manager.Poll call failed: write tcp 10.128.0.63:55054->10.128.0.26:33169: write: connection reset by peer [ 1160.420632] ? kthread_bind+0x40/0x40 [ 1160.424436] ret_from_fork+0x3a/0x50 [ 1160.428897] sched: RT throttling activated