r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000013c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="ebafe58181ff732e66617400028001000440000004f8010ae500aa0a3b7a286d6e5294b89f06e08557306db829284eed49b00c7cada5b789ce219a80d8eae54826994cd5", 0x44}, {&(0x7f0000000080)="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", 0x139, 0xb00}], 0x1001, &(0x7f0000001440)=ANY=[]) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043e"], 0x9) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0xfe, 0x0, 0x419}}}, 0x7) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = dup(r1) syz_emit_vhci(&(0x7f0000000340)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "611473"}}}, 0xd) bind$unix(r2, &(0x7f0000000000)=@abs, 0x6e) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x8044}, 0x40040) openat(r2, &(0x7f00000002c0)='./file0\x00', 0x404000, 0x94) syz_emit_vhci(&(0x7f00000001c0)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x1, @any, 0x81}}}, 0xb) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x4840, 0x0) ioctl$BLKIOMIN(r3, 0x5452, &(0x7f00000029c0)) openat$incfs(r3, &(0x7f0000000300)='.pending_reads\x00', 0x10000, 0x3) futimesat(r0, &(0x7f0000000040)='./file0\x00', 0x0)