0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0xe0) 04:30:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:29 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:29 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0xe0) [ 398.938559] attempt to access beyond end of device [ 398.963826] loop3: rw=2049, want=78, limit=64 [ 399.025289] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:30 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0xe0) 04:30:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:30 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0xe0) 04:30:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0xe0) [ 399.372293] attempt to access beyond end of device [ 399.382293] loop3: rw=2049, want=78, limit=64 [ 399.403077] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 399.447815] FAT-fs (loop5): invalid media value (0x00) 04:30:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 399.475863] FAT-fs (loop5): Can't find a valid FAT filesystem 04:30:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0xe0) [ 399.745447] attempt to access beyond end of device [ 399.789414] loop3: rw=2049, want=78, limit=64 [ 399.813515] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:30 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0xe0) 04:30:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) 04:30:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) 04:30:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) 04:30:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) [ 400.381087] FAT-fs (loop5): invalid media value (0x00) [ 400.396867] FAT-fs (loop5): Can't find a valid FAT filesystem 04:30:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:31 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") semctl$IPC_RMID(0x0, 0x0, 0x10) 04:30:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:32 executing program 0: 04:30:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:32 executing program 0: [ 401.390609] FAT-fs (loop5): invalid media value (0x00) [ 401.404935] FAT-fs (loop5): Can't find a valid FAT filesystem 04:30:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:32 executing program 0: 04:30:32 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:32 executing program 0: 04:30:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 401.977166] FAT-fs (loop5): invalid media value (0x00) [ 401.982501] FAT-fs (loop5): Can't find a valid FAT filesystem 04:30:33 executing program 0: 04:30:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:33 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:33 executing program 0: 04:30:33 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:33 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:33 executing program 0: 04:30:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:33 executing program 0: 04:30:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) [ 402.955601] FAT-fs (loop5): invalid media value (0x00) [ 402.961006] FAT-fs (loop5): Can't find a valid FAT filesystem 04:30:34 executing program 0: 04:30:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:34 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:34 executing program 0: 04:30:34 executing program 0: 04:30:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:34 executing program 0: 04:30:34 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 403.891805] FAT-fs (loop5): invalid media value (0x00) 04:30:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:34 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") pread64(r0, &(0x7f0000000200)=""/32, 0x20, 0x0) [ 403.932613] FAT-fs (loop5): Can't find a valid FAT filesystem 04:30:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x02\x00'}) 04:30:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:35 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 404.769367] FAT-fs (loop5): invalid media value (0x00) 04:30:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:35 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 404.808976] FAT-fs (loop5): Can't find a valid FAT filesystem 04:30:36 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) [ 405.479002] 9pnet: Insufficient options for proto=fd 04:30:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) [ 405.705923] 9pnet: Insufficient options for proto=fd 04:30:36 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40485404, 0x0) 04:30:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) [ 405.824666] FAT-fs (loop5): invalid media value (0x00) [ 405.888021] FAT-fs (loop5): Can't find a valid FAT filesystem [ 405.924599] 9pnet: Insufficient options for proto=fd 04:30:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:37 executing program 4: pipe2$9p(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 04:30:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 406.246022] 9pnet: Insufficient options for proto=fd 04:30:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:37 executing program 4: pipe2$9p(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 04:30:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 406.541834] 9pnet: Insufficient options for proto=fd 04:30:37 executing program 4: pipe2$9p(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 04:30:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) [ 406.822077] 9pnet: Insufficient options for proto=fd 04:30:37 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(0x0, 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:38 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(0x0, 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:38 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(0x0, 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:38 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:39 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xd}) 04:30:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xd}) 04:30:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 408.798099] attempt to access beyond end of device [ 408.826084] loop3: rw=2049, want=78, limit=64 [ 408.862506] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xd}) 04:30:39 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:40 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:40 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:40 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:41 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 410.348197] attempt to access beyond end of device [ 410.359485] loop3: rw=2049, want=78, limit=64 [ 410.365926] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:41 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) [ 410.663150] attempt to access beyond end of device [ 410.683651] loop2: rw=2049, want=78, limit=64 [ 410.688327] Buffer I/O error on dev loop2, logical block 77, lost async page write 04:30:41 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 410.808321] attempt to access beyond end of device 04:30:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:41 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 410.831189] loop3: rw=2049, want=78, limit=64 [ 410.846204] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:42 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 04:30:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:42 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 411.399369] attempt to access beyond end of device [ 411.432271] loop3: rw=2049, want=78, limit=64 04:30:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) [ 411.453232] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:42 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 04:30:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:42 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 04:30:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:42 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 04:30:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:43 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 412.160166] 9pnet: Insufficient options for proto=fd 04:30:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:43 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 412.412104] 9pnet: Insufficient options for proto=fd 04:30:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:43 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 04:30:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 412.815694] 9pnet: Insufficient options for proto=fd 04:30:43 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 04:30:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) [ 413.142866] 9pnet: Insufficient options for proto=fd 04:30:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:44 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 04:30:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 04:30:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) [ 413.341423] 9pnet: Insufficient options for proto=fd 04:30:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:44 executing program 4: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 04:30:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 413.597532] 9pnet: Insufficient options for proto=fd 04:30:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000003}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)=0x3) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) 04:30:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 417.337728] attempt to access beyond end of device 04:30:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 417.361161] loop4: rw=2049, want=78, limit=64 [ 417.379111] Buffer I/O error on dev loop4, logical block 77, lost async page write 04:30:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) [ 418.756713] attempt to access beyond end of device 04:30:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 418.781135] loop3: rw=2049, want=78, limit=64 [ 418.786791] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x28e, 0x0) 04:30:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, 0x0, 0x0, 0x0) 04:30:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, 0x0, 0x0, 0x0) 04:30:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 419.969974] attempt to access beyond end of device [ 419.976945] loop3: rw=2049, want=78, limit=64 [ 419.982103] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:30:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, 0x0, 0x0, 0x0) 04:30:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) [ 420.136244] attempt to access beyond end of device [ 420.146609] loop4: rw=2049, want=78, limit=64 [ 420.159174] Buffer I/O error on dev loop4, logical block 77, lost async page write 04:30:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) 04:30:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) 04:30:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xd}) 04:30:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xd}) 04:30:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xd}) 04:30:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) 04:30:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xd}) 04:30:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, 0x0) 04:30:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, 0x0) 04:30:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, 0x0) 04:30:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 426.479394] attempt to access beyond end of device [ 426.509972] loop2: rw=2049, want=78, limit=64 04:30:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 426.535439] Buffer I/O error on dev loop2, logical block 77, lost async page write 04:30:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x20000000000101, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 04:30:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 427.408112] attempt to access beyond end of device [ 427.413377] loop4: rw=2049, want=78, limit=64 [ 427.458357] Buffer I/O error on dev loop4, logical block 77, lost async page write 04:30:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, 0x0, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 428.290661] attempt to access beyond end of device [ 428.340742] loop2: rw=2049, want=78, limit=64 [ 428.392299] attempt to access beyond end of device [ 428.398512] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 428.404990] loop0: rw=2049, want=78, limit=64 [ 428.410940] Buffer I/O error on dev loop0, logical block 77, lost async page write 04:30:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:30:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, 0x0, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, 0x0, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, 0x0, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, 0x0, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 431.538544] attempt to access beyond end of device 04:31:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, 0x0, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 431.561651] loop4: rw=2049, want=78, limit=64 [ 431.594939] Buffer I/O error on dev loop4, logical block 77, lost async page write 04:31:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, 0x0, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 435.849534] attempt to access beyond end of device [ 435.862426] loop4: rw=2049, want=78, limit=64 [ 435.868937] Buffer I/O error on dev loop4, logical block 77, lost async page write 04:31:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 437.068616] attempt to access beyond end of device [ 437.076507] loop3: rw=2049, want=78, limit=64 [ 437.094300] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:31:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 437.399212] attempt to access beyond end of device [ 437.433682] loop2: rw=2049, want=78, limit=64 [ 437.452537] Buffer I/O error on dev loop2, logical block 77, lost async page write 04:31:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) [ 437.634772] attempt to access beyond end of device [ 437.676541] loop3: rw=2049, want=78, limit=64 [ 437.692437] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:31:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) 04:31:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) [ 438.195403] attempt to access beyond end of device 04:31:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 438.224363] loop3: rw=2049, want=78, limit=64 [ 438.243808] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:31:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) [ 438.824472] attempt to access beyond end of device [ 438.881722] loop3: rw=2049, want=78, limit=64 [ 438.915722] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:31:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, 0x0, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) 04:31:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) 04:31:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 439.595468] attempt to access beyond end of device 04:31:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) [ 439.678004] loop0: rw=2049, want=78, limit=64 [ 439.713315] Buffer I/O error on dev loop0, logical block 77, lost async page write 04:31:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, 0x0, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, 0x0, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, 0x0, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 442.067251] attempt to access beyond end of device [ 442.074716] loop2: rw=2049, want=78, limit=64 [ 442.086248] Buffer I/O error on dev loop2, logical block 77, lost async page write 04:31:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 444.018197] attempt to access beyond end of device [ 444.026064] attempt to access beyond end of device [ 444.037200] loop2: rw=2049, want=78, limit=64 [ 444.042467] Buffer I/O error on dev loop2, logical block 77, lost async page write 04:31:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) [ 444.078877] loop3: rw=2049, want=78, limit=64 04:31:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 444.105516] Buffer I/O error on dev loop3, logical block 77, lost async page write 04:31:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, 0x0}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) 04:31:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, 0x0}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) 04:31:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, 0x0}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000480)) 04:31:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, 0x0}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, 0x0}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 448.807360] attempt to access beyond end of device [ 448.871324] loop0: rw=2049, want=78, limit=64 04:31:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 448.921135] Buffer I/O error on dev loop0, logical block 77, lost async page write 04:31:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, 0x0}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, 0x0, &(0x7f0000000480)) 04:31:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 450.751778] attempt to access beyond end of device 04:31:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 450.772368] loop2: rw=2049, want=78, limit=64 [ 450.798154] Buffer I/O error on dev loop2, logical block 77, lost async page write 04:31:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, 0x0, &(0x7f0000000480)) 04:31:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 452.054209] attempt to access beyond end of device [ 452.065217] loop0: rw=2049, want=78, limit=64 [ 452.089211] Buffer I/O error on dev loop0, logical block 77, lost async page write 04:31:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2f"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, 0x0, &(0x7f0000000480)) 04:31:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, 0x0, &(0x7f0000000480)) 04:31:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, 0x0, &(0x7f0000000480)) 04:31:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, 0x0, &(0x7f0000000480)) 04:31:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, 0x0) 04:31:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) clock_adjtime(0x0, &(0x7f00000001c0)) 04:31:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) ppoll(0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}, 0x0, 0x0) 04:31:26 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x11, r1) 04:31:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) capset(&(0x7f0000000140)={0x19980330}, &(0x7f0000032fe8)) [ 456.071509] ptrace attach of "/root/syz-executor.3"[7914] was attempted by "/root/syz-executor.3"[11832] [ 456.211010] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) [ 456.316142] ptrace attach of "/root/syz-executor.3"[7914] was attempted by "/root/syz-executor.3"[11941] 04:31:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 04:31:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 04:31:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:31:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:27 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000600), 0x4c6) 04:31:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x80000000000e, 0x0, &(0x7f0000000040)=0x25) 04:31:27 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='$!\t'], 0x3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 456.697345] sock: process `syz-executor.2' is using obsolete getsockopt SO_BSDCOMPAT 04:31:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000300)=0x34f, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e27, @remote}, 0xfffffffffffffee9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1}, 0xfffffdd3) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0xffffffffffffff2a) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000040)) close(r1) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) setsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f0000001500)="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", 0x1000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = dup3(r2, r2, 0x80000) read(r1, &(0x7f00000005c0)=""/184, 0xfffffffffffffff0) fcntl$setstatus(r2, 0x4, 0x1000000000042800) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r4, &(0x7f00000003c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4041}, 0x4090) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$FS_IOC_SETFSLABEL(r5, 0x41009432, &(0x7f00000004c0)="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") arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x93a0) 04:31:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) mq_unlink(0x0) [ 457.073465] audit: type=1400 audit(1564115488.063:62): avc: denied { map } for pid=12053 comm="syz-executor.2" path="/dev/loop0" dev="devtmpfs" ino=15294 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:31:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) setrlimit(0x0, &(0x7f00000000c0)) 04:31:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 04:31:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 04:31:28 executing program 1: clone(0x2003102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x18) 04:31:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) keyctl$get_security(0x11, 0x0, &(0x7f00000002c0)=""/203, 0xffffffffffffffb7) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 04:31:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:28 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='coredump_filter\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) sendfile(r2, r0, 0x0, 0xf9) [ 457.697891] audit: type=1400 audit(1564115488.693:63): avc: denied { map } for pid=12160 comm="syz-executor.3" path=2F6D656D66643A73656375726974792E73656C696E7578202864656C6574656429 dev="tmpfs" ino=66203 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 04:31:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, 0x0, r1, r2) 04:31:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000300)=0x34f, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e27, @remote}, 0xfffffffffffffee9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1}, 0xfffffdd3) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0xffffffffffffff2a) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000040)) close(r1) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) setsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f0000001500)="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", 0x1000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = dup3(r2, r2, 0x80000) read(r1, &(0x7f00000005c0)=""/184, 0xfffffffffffffff0) fcntl$setstatus(r2, 0x4, 0x1000000000042800) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r4, &(0x7f00000003c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4041}, 0x4090) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$FS_IOC_SETFSLABEL(r5, 0x41009432, &(0x7f00000004c0)="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") arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x93a0) 04:31:28 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:31:28 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:29 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) syncfs(0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) getuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) fchdir(0xffffffffffffffff) [ 458.270351] attempt to access beyond end of device [ 458.278455] loop5: rw=2049, want=78, limit=64 [ 458.300150] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:29 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:29 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:30 executing program 2: lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) 04:31:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:30 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 459.187609] attempt to access beyond end of device 04:31:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 459.211721] loop5: rw=2049, want=78, limit=64 [ 459.259491] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:30 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000380)='./bus\x00', 0x141046, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 04:31:30 executing program 2: lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) 04:31:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:30 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:30 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0xd}) 04:31:30 executing program 2: r0 = socket(0x10, 0x80003, 0x0) write(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) 04:31:30 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) 04:31:30 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000240)="6e046378eb40ae90a6b2e23bfdd1905809af014be8ae11e12379bf1315bdfad6805cc1204956586effe838c88d545923764481620d0b66931c187df49d3a1db9b9223487e6fa8c2b2e5f2f5c49fe3b7741941be167689e745152cea0009c53c14f8f80bcb8b387f71075d4b7abb2ff0c8672a8621e5b085b2056bd6d00a5fa2e103b40e54a27713cb9842e7d71e95a9626", 0x91, 0x10, 0x0, 0x0) 04:31:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0xd}) 04:31:30 executing program 1: restart_syscall() setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000b80)=0x848, 0x4) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000cc0)) r0 = semget$private(0x0, 0x2, 0x20) semctl$SETALL(r0, 0x0, 0x11, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000e00)='trusted.overlay.redirect\x00', &(0x7f0000000e40)='./file0\x00', 0x8, 0x3) 04:31:31 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 04:31:31 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) [ 460.260415] attempt to access beyond end of device [ 460.269954] loop5: rw=2049, want=78, limit=64 [ 460.277157] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0xd}) 04:31:31 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 04:31:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) 04:31:31 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:31 executing program 1: connect$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigpending(0x0, 0x85) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x0, 0x0}, 0x10) 04:31:31 executing program 2: mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 04:31:31 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 04:31:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x401c, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 04:31:32 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad0000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:32 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x401c, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 04:31:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:32 executing program 1: r0 = gettid() prctl$PR_GET_UNALIGN(0x5, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000340)) keyctl$join(0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x2001000000000016) 04:31:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:32 executing program 1: semget(0x0, 0x0, 0x691) 04:31:32 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:32 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000040)) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x77359400}}, 0x0) 04:31:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:32 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) setxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) [ 462.310504] attempt to access beyond end of device [ 462.316292] loop5: rw=2049, want=78, limit=64 [ 462.321358] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:33 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:33 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) clock_settime(0x2, &(0x7f0000000700)={0x77359400}) mount$9p_fd(0x0, &(0x7f0000000800)='./file0\x00', 0x0, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x20000000) removexattr(0x0, 0x0) 04:31:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x122, &(0x7f0000000200)={@local, @random="ed497db0f7be", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 04:31:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad0000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000000c0)='&', 0x1, 0x430bb869054d2835, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x1e}}, 0x1c) 04:31:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:33 executing program 2: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 04:31:33 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x1, 0x0, 0x0) 04:31:33 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:34 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) 04:31:34 executing program 2: timer_create(0x7, 0x0, &(0x7f0000000240)) 04:31:34 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad0000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:34 executing program 2: 04:31:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x205, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x40) dup2(r1, r2) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x841, 0x0) clone(0x4003102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000001780)={0x0, 0x1ff, &(0x7f00000000c0)={0x0}}, 0x0) 04:31:34 executing program 2: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1840, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 04:31:34 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) [ 464.102227] attempt to access beyond end of device [ 464.113012] loop5: rw=2049, want=78, limit=64 [ 464.120082] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:35 executing program 1: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x7b2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x1) r2 = dup2(r0, r1) creat(&(0x7f0000000000)='./file1\x00', 0x0) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x83e, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2800) 04:31:35 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000140), 0x132156) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x41ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_mtu(r2, 0x29, 0x17, 0x0, 0x52) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) 04:31:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:35 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:35 executing program 1: clone(0x200200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)) 04:31:35 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:35 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:36 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:36 executing program 2: 04:31:36 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:37 executing program 1: 04:31:37 executing program 2: 04:31:37 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') pwrite64(0xffffffffffffffff, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0xd}) 04:31:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 466.286650] FAT-fs (loop4): bogus number of reserved sectors 04:31:37 executing program 2: 04:31:37 executing program 1: 04:31:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:37 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') pwrite64(0xffffffffffffffff, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 466.331678] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:37 executing program 1: 04:31:37 executing program 2: 04:31:37 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') pwrite64(0xffffffffffffffff, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:37 executing program 2: 04:31:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:38 executing program 1: [ 467.162908] FAT-fs (loop4): bogus number of reserved sectors [ 467.171791] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:38 executing program 2: 04:31:38 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:38 executing program 1: 04:31:38 executing program 2: 04:31:38 executing program 1: 04:31:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:38 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:38 executing program 2: 04:31:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:38 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 468.074820] FAT-fs (loop4): bogus number of reserved sectors [ 468.084100] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:39 executing program 1: 04:31:39 executing program 2: 04:31:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:39 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:39 executing program 1: 04:31:39 executing program 2: 04:31:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:39 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000a00000200000000fe80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004deb200de78488087971e1eec8c200000000000000000000000000000a0000000000000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ae5ee1f8b9f71d30000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000000000ead43d4180ffac14140000000000000000000000004051e17c1cd8bc9500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ffff1874fcb77bbef9af361293aad08c53e1888291b542cce08c694ec8ecccc8e6adf9591ae35eb263f8272be09516ac31a4a0ce9684d588751240685a964db6b88986c839fbacaba993f6a921aa84de0e719680d62476121d676d087315fa8c5aad5ccb169fc22a4889637b"], 0x440e) 04:31:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:39 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 468.962748] FAT-fs (loop4): bogus number of reserved sectors [ 468.975224] attempt to access beyond end of device [ 468.980249] loop5: rw=2049, want=78, limit=64 [ 468.985098] FAT-fs (loop4): Can't find a valid FAT filesystem [ 468.991695] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") semctl$IPC_RMID(0x0, 0x0, 0xb) 04:31:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000a00000200000000fe80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004deb200de78488087971e1eec8c200000000000000000000000000000a0000000000000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ae5ee1f8b9f71d30000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000000000ead43d4180ffac14140000000000000000000000004051e17c1cd8bc9500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ffff1874fcb77bbef9af361293aad08c53e1888291b542cce08c694ec8ecccc8e6adf9591ae35eb263f8272be09516ac31a4a0ce9684d588751240685a964db6b88986c839fbacaba993f6a921aa84de0e719680d62476121d676d087315fa8c5aad5ccb169fc22a4889637b"], 0x440e) 04:31:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:40 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x3}) 04:31:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') read$FUSE(r1, &(0x7f0000000140), 0x1000) 04:31:40 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:40 executing program 2: ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) r2 = open(0x0, 0x48000, 0x0) write$binfmt_misc(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7bae229e8e9d005775addd5feca011ab07c1c238588fc4c89f1cc5be87c03cad2bbc93f4a7a3353a2fa778de57f5f79c195da832d3c1d412af52382bf4ae60504fb05ae4b8ca8cd4d7f5df5caf5cadca484031903439c5839f9967e5b3073e836dd413f2fbbfd9667d2915388c253c17f92dba46ad255b68cc0a81766e85cc8ea468b51da7bc3493974ab3f6021a696e441ec6a3c052f820a0281e2e8bc6f6e657fa0de8289f1d0f59277cbb148c08663c2c52161477bfb1cce9bda3c317f7f2e5aa93320dd12f0d1ec967995d5b9987fdfd4e17fc766f4a12278e7db26a58df2e2b522b9e0542fb2c9b82c55b0e3b389b9a79e393c0931470d27c3e6797a887efcace86cc8ce104ee6cbf8993cd2e8218ecaaf5adf2e208b215a8c3f544941d2d289fd57a4f8acaa47f9153f0eb59725fb37b0e81cccc5b8cb5c30fcef9872e82f61a7b9ea8e829d56ff50f4b72db9c4233636f22f14280e6fd767eee7bc1f2bc91ecb04060272c60"], 0x169) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3f) pipe(0x0) write(r2, 0x0, 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x400080) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000000c0)={0x80000001, 0x8, 0xffff, 0x5ce9}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r4, &(0x7f0000000080)="36044609072198b05d", 0x9) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r6 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:31:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newae={0x40, 0x1e, 0xb19, 0x0, 0x0, {{@in=@local}, @in6=@mcast1}}, 0x40}}, 0x0) 04:31:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:40 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 469.855695] FAT-fs (loop4): bogus number of reserved sectors [ 469.861861] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:41 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 470.077835] overlayfs: unrecognized mount option "ino=on" or missing value [ 470.135795] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:41 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 470.279913] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xe) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) open_by_handle_at(r0, &(0x7f0000000040)={0xf, 0x1}, 0x0) 04:31:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 470.765098] overlayfs: unrecognized mount option "ino=on" or missing value [ 470.788659] attempt to access beyond end of device [ 470.802642] loop5: rw=2049, want=78, limit=64 04:31:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) [ 470.813191] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 470.813679] FAT-fs (loop4): bogus number of reserved sectors 04:31:41 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xe) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) open_by_handle_at(r0, &(0x7f0000000040)={0xf, 0x1}, 0x0) [ 470.913526] FAT-fs (loop4): Can't find a valid FAT filesystem [ 470.924005] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:42 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xe) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) open_by_handle_at(r0, &(0x7f0000000040)={0xf, 0x1}, 0x0) [ 471.109014] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:42 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) [ 471.197150] FAT-fs (loop4): bogus number of reserved sectors [ 471.230307] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:42 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 471.376171] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xe) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) open_by_handle_at(r0, &(0x7f0000000040)={0xf, 0x1}, 0x0) 04:31:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:42 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:42 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:42 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x3, 0x1}, 0x20) 04:31:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 471.902111] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) quotactl(0x8, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0xf, 0x1}, 0x0) 04:31:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:43 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:43 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:43 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 472.159708] FAT-fs (loop4): bogus number of reserved sectors [ 472.177005] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) quotactl(0x8, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0xf, 0x1}, 0x0) 04:31:43 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:43 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 472.685910] attempt to access beyond end of device [ 472.691224] loop5: rw=2049, want=78, limit=64 [ 472.696883] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:43 executing program 2: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000004c0)='overlay\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 04:31:44 executing program 1: creat(0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:44 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:44 executing program 1: creat(0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) [ 473.133989] FAT-fs (loop4): bogus number of reserved sectors 04:31:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) getpeername$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) [ 473.207042] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:44 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:44 executing program 1: creat(0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 473.586814] attempt to access beyond end of device [ 473.604366] loop5: rw=2049, want=78, limit=64 [ 473.612731] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000000080)) 04:31:44 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) [ 473.777269] overlayfs: unrecognized mount option "ino=on" or missing value [ 473.805930] FAT-fs (loop4): bogus number of reserved sectors [ 473.859925] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:44 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000003540)='/dev/dlm_plock\x00', 0x0, 0x0) read(r0, &(0x7f0000003f00)=""/247, 0xf7) 04:31:44 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 474.044642] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000003540)='/dev/dlm_plock\x00', 0x0, 0x0) read(r0, &(0x7f0000003f00)=""/247, 0xf7) 04:31:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 474.458874] attempt to access beyond end of device [ 474.464363] loop5: rw=2049, want=78, limit=64 [ 474.468975] Buffer I/O error on dev loop5, logical block 77, lost async page write 04:31:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:45 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x100000000, 0x0, {"169a3200261b8077638d8236a678aec9"}, 0x4, 0x0, 0xfffffffffffffff7}}}, 0xa0) gettid() socket$inet6(0xa, 0x3, 0x6) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000008c0)=""/78) socket$inet(0x2, 0x0, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000700), &(0x7f0000000740)=0xc) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)=@canfd={{0x2, 0x7f, 0x1000}, 0x0, 0x2, 0x0, 0x0, "2713ca7b722632959cb2cea58619012529a0d9055fff0017e980157ba0c252d854568dd3f2ddc7fb2b936cb1ee5ae1dbb4d3a54bb87816b5f4d2340e2a284315"}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x80) [ 474.668628] overlayfs: unrecognized mount option "ino=on" or missing value 04:31:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 474.721351] FAT-fs (loop4): bogus number of reserved sectors [ 474.731105] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) [ 474.765955] bond0: Releasing backup interface bond_slave_1 04:31:45 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:46 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) [ 475.711465] FAT-fs (loop4): bogus number of reserved sectors [ 475.773904] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:47 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x100000000, 0x0, {"169a3200261b8077638d8236a678aec9"}, 0x4, 0x0, 0xfffffffffffffff7}}}, 0xa0) gettid() socket$inet6(0xa, 0x3, 0x6) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000008c0)=""/78) socket$inet(0x2, 0x0, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000700), &(0x7f0000000740)=0xc) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)=@canfd={{0x2, 0x7f, 0x1000}, 0x0, 0x2, 0x0, 0x0, "2713ca7b722632959cb2cea58619012529a0d9055fff0017e980157ba0c252d854568dd3f2ddc7fb2b936cb1ee5ae1dbb4d3a54bb87816b5f4d2340e2a284315"}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x80) 04:31:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={[{@xino_on=',ino=on'}]}) 04:31:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 476.931801] FAT-fs (loop4): bogus number of reserved sectors [ 476.981505] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, 0x0) 04:31:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 477.236516] overlayfs: missing 'lowerdir' 04:31:48 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, 0x0) [ 477.321890] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:31:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 477.476439] overlayfs: missing 'lowerdir' 04:31:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, 0x0) 04:31:48 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0_to_bond\x00', 0x20000005001}) 04:31:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 477.744389] overlayfs: missing 'lowerdir' 04:31:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x1000004200210007) keyctl$revoke(0x3, r0) 04:31:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) [ 477.830313] FAT-fs (loop4): bogus number of reserved sectors 04:31:48 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 477.888003] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)) 04:31:49 executing program 2: 04:31:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 478.168508] FAT-fs (loop4): bogus number of reserved sectors [ 478.200395] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:49 executing program 2: clone(0x200200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) creat(&(0x7f00000000c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)) 04:31:49 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)) [ 478.395353] attempt to access beyond end of device [ 478.400851] loop5: rw=2049, want=78, limit=64 [ 478.406802] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 478.485318] overlayfs: missing 'lowerdir' 04:31:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)) 04:31:49 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:49 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 478.782784] overlayfs: missing 'lowerdir' 04:31:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:49 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x2}, 0x20) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 04:31:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 479.180203] FAT-fs (loop4): bogus number of reserved sectors [ 479.193923] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:50 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0xd}) 04:31:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xd75a5) clone(0x402102003ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 04:31:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0xd}) 04:31:50 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0xd}) 04:31:50 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 04:31:50 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0xd}) 04:31:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:51 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 480.112855] FAT-fs (loop4): bogus number of reserved sectors [ 480.120455] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, 0x0) 04:31:51 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xffffffffffffff9a, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) 04:31:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, 0x0) 04:31:51 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:51 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000240)='./file1\x00', 0x100000000c042, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) exit_group(0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x4) 04:31:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xffffffffffffff9a, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) 04:31:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, 0x0) 04:31:51 executing program 1: mbind(&(0x7f00000cf000/0x2000)=nil, 0x2000, 0x4003, &(0x7f0000000000)=0xfffffffffffffc01, 0x101, 0x0) 04:31:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:51 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 481.098824] FAT-fs (loop4): bogus number of reserved sectors [ 481.135109] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)) 04:31:52 executing program 2: 04:31:52 executing program 1: 04:31:52 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:52 executing program 2: 04:31:52 executing program 1: 04:31:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)) 04:31:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 04:31:52 executing program 1: clock_adjtime(0x0, &(0x7f0000000080)={0x1ff, 0x0, 0x4000000000}) [ 481.742350] attempt to access beyond end of device [ 481.766956] loop2: rw=2049, want=78, limit=64 [ 481.772148] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 481.815376] attempt to access beyond end of device [ 481.820469] loop2: rw=2049, want=78, limit=64 [ 481.846342] Buffer I/O error on dev loop2, logical block 77, lost async page write 04:31:52 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:52 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$ndb(0x0, 0x0, 0x20000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_open_dev$audion(0x0, 0x4, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYPTR, @ANYRES16, @ANYRESHEX=r0], 0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffffffffffefd, 0x1, &(0x7f0000000180), 0x10000000000000a2) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000200)={0x0, 0x0, 'client0\x00', 0x1, "c18119d7285ffeb9", "5569c4169bfb850f3af44d1072b8921025aa823d7e7a23bcc4b0c016d39f307a", 0x7, 0x7ff}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000]}, 0x2c) 04:31:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x126, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)) 04:31:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 04:31:53 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') preadv(r1, &(0x7f0000002280)=[{&(0x7f0000001140)=""/254, 0xfe}, {&(0x7f0000001280)=""/4096, 0x1000}], 0x2, 0x0) [ 482.466033] FAT-fs (loop4): invalid media value (0x00) [ 482.471366] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x100000000, 0x0, {"169a3200261b8077638d8236a678aec9"}, 0x4, 0x0, 0xfffffffffffffff7}}}, 0xa0) gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}, 0x0) socket$inet(0x2, 0x0, 0x800) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) 04:31:53 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r4, 0xaeb7) getsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) 04:31:53 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:53 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) mknod$loop(&(0x7f00000002c0)='./file1/file0\x00', 0x0, 0xffffffffffffffff) renameat2(r0, &(0x7f0000000000)='./file1/file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x2) [ 482.766701] bond0: Releasing backup interface bond_slave_1 04:31:53 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x2000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) r5 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1400200007000007002565"], 0xb) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3ce) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="03000029bf00000008001b0000000000"], 0x28}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:31:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) 04:31:53 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) [ 483.026977] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 483.067549] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 483.247157] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:31:54 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x0) 04:31:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) [ 483.519961] FAT-fs (loop4): invalid media value (0x00) [ 483.547402] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:54 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0xf, 0x1}, 0x0) 04:31:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x0) 04:31:54 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000800)='/dev/md0\x00', 0x0, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) dup3(r1, r0, 0x0) 04:31:54 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:55 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="747970653dd5"]) 04:31:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:55 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:55 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x2, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) [ 484.319971] hfsplus: type requires a 4 character value [ 484.353908] hfsplus: unable to parse mount options [ 484.397245] hfsplus: type requires a 4 character value [ 484.422277] hfsplus: unable to parse mount options [ 484.432591] kasan: CONFIG_KASAN_INLINE enabled 04:31:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b1846748d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9b4900deceec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77129f3f60734552e1c26c2e7a5a6b6468879775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad000000"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000006d40)={0x0}}, 0x0) accept(r0, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000480)=0x80) 04:31:55 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000800)='/dev/md0\x00', 0x0, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) dup3(r1, r0, 0x0) [ 484.470801] FAT-fs (loop4): invalid media value (0x00) [ 484.479127] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 484.487918] FAT-fs (loop4): Can't find a valid FAT filesystem 04:31:55 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x10000000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f0000000240)={'L+', 0xfffffffffffffffc}, 0x28, 0x2) eventfd(0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 04:31:55 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="747970653dd5"]) 04:31:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000002e40)=[{{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001800)='+', 0x1}], 0x1, &(0x7f0000002d80)=[@ip_tos_int={{0x14}}], 0x18}}], 0x1, 0x0) [ 484.540139] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 484.546433] CPU: 0 PID: 14161 Comm: syz-executor.1 Not tainted 4.19.60 #34 [ 484.553465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.562942] RIP: 0010:rxrpc_connect_call+0xe0/0x48d0 [ 484.568048] Code: 03 80 3c 18 00 0f 85 a9 40 00 00 48 8b 85 08 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 76 40 00 00 48 8b 5b 18 48 8d bb f0 01 00 00 48 [ 484.586948] RSP: 0018:ffff88804da9f660 EFLAGS: 00010206 [ 484.592294] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90008080000 [ 484.599563] RDX: 0000000000000003 RSI: ffffffff86538870 RDI: 0000000000000018 [ 484.606817] RBP: ffff88804da9f7d0 R08: 00000000006000c0 R09: ffff8880a57a09e0 [ 484.614089] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88807f6ffb40 [ 484.621344] R13: ffff888092b70560 R14: ffff888092b70550 R15: ffff88804da9f8f8 [ 484.628628] FS: 00007f739f2b2700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 484.636840] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 484.642703] CR2: 0000000020000000 CR3: 0000000099ea7000 CR4: 00000000001406f0 [ 484.649973] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 484.657226] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 484.664474] Call Trace: [ 484.667125] ? release_sock+0x156/0x1c0 [ 484.671137] ? find_held_lock+0x35/0x130 [ 484.675211] ? rxrpc_discard_expired_client_conns+0x8b0/0x8b0 [ 484.681131] ? lockdep_hardirqs_on+0x415/0x5d0 [ 484.685703] ? release_sock+0x156/0x1c0 [ 484.689712] ? trace_hardirqs_on+0x67/0x220 [ 484.694021] ? release_sock+0x156/0x1c0 [ 484.698016] ? __local_bh_enable_ip+0x15a/0x270 [ 484.702722] ? _raw_spin_unlock_bh+0x31/0x40 [ 484.707124] rxrpc_new_client_call+0x8e7/0x1880 [ 484.711793] ? rxrpc_do_sendmsg+0xfbe/0x1c8f [ 484.716208] rxrpc_do_sendmsg+0xfbe/0x1c8f [ 484.720550] ? rxrpc_kernel_send_data+0x4b0/0x4b0 [ 484.725396] ? __local_bh_enable_ip+0x15a/0x270 [ 484.730057] ? lockdep_hardirqs_on+0x415/0x5d0 [ 484.734637] ? lock_sock_nested+0x9a/0x120 [ 484.738858] ? __local_bh_enable_ip+0x15a/0x270 [ 484.743536] rxrpc_sendmsg+0x4b8/0x5f0 [ 484.747415] ? rxrpc_sock_destructor+0x170/0x170 [ 484.752217] sock_sendmsg+0xd7/0x130 [ 484.755933] ___sys_sendmsg+0x3e2/0x920 [ 484.759900] ? copy_msghdr_from_user+0x430/0x430 [ 484.764643] ? lock_downgrade+0x810/0x810 [ 484.768838] ? kasan_check_read+0x11/0x20 [ 484.772986] ? __fget+0x367/0x540 [ 484.776424] ? iterate_fd+0x360/0x360 [ 484.780214] ? mark_held_locks+0x100/0x100 [ 484.784442] ? __fget_light+0x1a9/0x230 [ 484.788427] ? __fdget+0x1b/0x20 [ 484.791830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 484.797370] ? sockfd_lookup_light+0xcb/0x180 [ 484.801853] __sys_sendmmsg+0x1bf/0x4e0 [ 484.805815] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 484.810169] ? _copy_to_user+0xc9/0x120 [ 484.814149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 484.819778] ? put_timespec64+0xda/0x140 [ 484.823835] ? nsecs_to_jiffies+0x30/0x30 [ 484.827983] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 484.832724] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 484.837468] ? do_syscall_64+0x26/0x620 [ 484.841439] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.846800] ? do_syscall_64+0x26/0x620 [ 484.850782] __x64_sys_sendmmsg+0x9d/0x100 [ 484.855003] do_syscall_64+0xfd/0x620 [ 484.858820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.864005] RIP: 0033:0x459829 [ 484.867191] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.886092] RSP: 002b:00007f739f2b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 484.893807] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 484.901075] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000003 [ 484.908329] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 484.915581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f739f2b26d4 [ 484.922834] R13: 00000000004c6e90 R14: 00000000004dc250 R15: 00000000ffffffff [ 484.930090] Modules linked in: [ 484.934204] ---[ end trace 15e261c0d46e0dea ]--- [ 484.939119] RIP: 0010:rxrpc_connect_call+0xe0/0x48d0 [ 484.943626] kobject: 'loop2' (00000000ccdbd75f): kobject_uevent_env [ 484.944492] Code: 03 80 3c 18 00 0f 85 a9 40 00 00 48 8b 85 08 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 76 40 00 00 48 8b 5b 18 48 8d bb f0 01 00 00 48 [ 484.950692] kobject: 'loop2' (00000000ccdbd75f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 484.969649] RSP: 0018:ffff88804da9f660 EFLAGS: 00010206 [ 484.985971] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90008080000 [ 484.993331] RDX: 0000000000000003 RSI: ffffffff86538870 RDI: 0000000000000018 [ 485.000785] RBP: ffff88804da9f7d0 R08: 00000000006000c0 R09: ffff8880a57a09e0 [ 485.010572] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88807f6ffb40 [ 485.017936] R13: ffff888092b70560 R14: ffff888092b70550 R15: ffff88804da9f8f8 [ 485.025504] kobject: 'loop5' (000000007d3bfafe): kobject_uevent_env [ 485.027599] FS: 00007f739f2b2700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 485.032083] kobject: 'loop5' (000000007d3bfafe): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 485.040326] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 485.059070] CR2: 0000000020000000 CR3: 0000000099ea7000 CR4: 00000000001406f0 [ 485.066698] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 485.074047] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 485.081333] Kernel panic - not syncing: Fatal exception [ 485.087671] Kernel Offset: disabled [ 485.091294] Rebooting in 86400 seconds..