ffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:11 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) [ 738.694567] sp0: Synchronizing with TNC [ 738.866569] FAT-fs (loop1): invalid media value (0x00) [ 738.872073] FAT-fs (loop1): Can't find a valid FAT filesystem 14:00:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 739.034959] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 739.043102] sp1: Synchronizing with TNC [ 739.043315] FAT-fs (loop4): Filesystem has been set read-only [ 739.053263] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) [ 739.301946] sp0: Synchronizing with TNC [ 739.378105] sp1: Synchronizing with TNC 14:00:11 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:11 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) [ 739.592186] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 739.600537] FAT-fs (loop2): Filesystem has been set read-only [ 739.606536] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) [ 739.823731] FAT-fs (loop1): invalid media value (0x00) [ 739.829130] FAT-fs (loop1): Can't find a valid FAT filesystem 14:00:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000040)="355b11c79120cc11d4f90cf9f675a5") 14:00:12 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r0, 0x4142, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f00000000c0)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, 0x0) ioctl$TCSETXW(r1, 0x5435, 0x0) 14:00:13 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:13 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:13 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:13 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x488000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000080)=""/17, &(0x7f00000000c0)=0x11) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, 0x0) ioctl$TCSETXW(r1, 0x5435, 0x0) 14:00:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 740.930082] FAT-fs (loop1): invalid media value (0x00) [ 740.935534] FAT-fs (loop1): Can't find a valid FAT filesystem 14:00:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) fcntl$setpipe(r2, 0x407, 0x7) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:00:14 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 741.517301] sp0: Synchronizing with TNC 14:00:14 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 741.733392] sp0: Synchronizing with TNC [ 742.059916] sp0: Synchronizing with TNC 14:00:14 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = dup(r1) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), 0x4) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 742.115272] FAT-fs (loop1): invalid media value (0x00) [ 742.121698] FAT-fs (loop1): Can't find a valid FAT filesystem 14:00:14 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r5}, 0x0, &(0x7f0000000380), 0x0) r6 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', 0x0, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f00000003c0)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}, {&(0x7f00000005c0)="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", 0xff}, {&(0x7f0000000100)="2220f74b9188d6dde5fe1fd8c1160718bf2dc868da61a2b894f33b4f81b73e296878431f495365a55b61", 0x2a}], 0x3, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r11, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0xef, 0x0}) [ 742.478800] sp0: Synchronizing with TNC 14:00:15 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:15 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 742.877716] sp0: Synchronizing with TNC [ 743.401056] FAT-fs (loop1): invalid media value (0x00) [ 743.406548] FAT-fs (loop1): Can't find a valid FAT filesystem 14:00:15 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1c, 0x0, 0x0, 0x0}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_buf(r1, 0x0, 0x23, &(0x7f00000001c0)="9542c412c6fa9a7c1ad756073bfaf1a0a9132a4e7ded6af7689077bd41e3b41cc5be2641ed8417b6be224e3c03174643871d5a9f8650da5f9aebeee93d056dbfb4beac26c33b2c3bebc2d6cbcd1c69aa8d3cb6a1b659455021a1de8dffcb530bfe45", 0x62) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000001240)={0x1f, 0x1000, &(0x7f0000000240)="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"}) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8850) 14:00:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:16 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:16 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1, 0x9ca0, 0x0, 0x100}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r9}, 0x0, &(0x7f0000000380), 0x0) r10 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r10}, 0x0, &(0x7f0000000380), 0x0) r11 = add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f00000005c0)="1e486b531322e741b45f1e541a0ffc285ff2f9887b4f5fd70aaf881d842b02adbd5cc7773aac35d5f2da43945a49e896ba72859cff93a373f9dcefffa6b5af50d0169ecbf77b73ce8cd9e16c2d276317ffe3911394df31150b195a419c1c38d8f0d0aafa67bd35c6c3e5d386ed010e7909c528cfe9f1590e98c83755775e4aaebc3087f045c78dc47f7a6c27086917e0560d1e30a4655699888820107a3be676d0b96bb3cdd36be534603cd2ed5260bcb681c9e4332291dd6f5ad4149fd9e5fe0d9e45d094d3a5d6cf517fa7c8f9eda440140a0a941b4a2bb873efba2e1e0652d573a8e5f070f72c375bf834", 0xec, r10) r12 = add_key(0x0, &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000000340), 0xfffffffffffffeca, r11) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280), 0x0, r12) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r13 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r13, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r14 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r14, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r14, r14, &(0x7f00000001c0), 0x8080fffffffe) 14:00:16 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 744.264609] FAT-fs (loop1): invalid media value (0x00) [ 744.270299] FAT-fs (loop1): Can't find a valid FAT filesystem 14:00:17 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x0, 0x5000003, 0x18, 0x0, 0x0}) [ 744.624943] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 744.633303] FAT-fs (loop4): Filesystem has been set read-only [ 744.639523] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:17 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:17 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(0x0, 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:17 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x14, 0x0, 0x113, 0x0}) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffa000/0x4000)=nil, 0x200, 0x0, 0x80, &(0x7f0000ffa000/0x4000)=nil, 0x7427}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = socket$phonet(0x23, 0x2, 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x6, 0x4}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x1, 0x10}, 0xc) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x4211, 0x4) 14:00:17 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) r10 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) r12 = request_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000480)='syz', r10) keyctl$KEYCTL_MOVE(0x1e, r4, r12, r11, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r13 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r13) r14 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r14, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r14, r14, &(0x7f00000001c0), 0x8080fffffffe) 14:00:18 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(0x0, 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:18 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x400100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) poll(&(0x7f00000005c0)=[{r0, 0x80}, {r2, 0x200}, {r3, 0x8040}, {r4, 0x84}], 0x4, 0x9) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x401, &(0x7f0000000180)={[{@index_off='index=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'selinux'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000080)={0x8001, 0x8, 0x2, 0x1000, 0x1f, "771d0e2e80ccabbb4b561d0700"}) r5 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$GIO_FONT(r5, 0x4b60, &(0x7f0000000280)=""/147) 14:00:19 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 746.839273] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 746.847786] FAT-fs (loop4): Filesystem has been set read-only [ 746.853914] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) [ 746.963479] sp0: Synchronizing with TNC [ 747.055600] sp0: Synchronizing with TNC [ 747.103547] overlayfs: unrecognized mount option "nfs_export=on" or missing value 14:00:19 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 747.422669] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 747.430982] FAT-fs (loop2): Filesystem has been set read-only [ 747.436968] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:20 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(0x0, 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000040)) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) [ 747.607321] sp0: Synchronizing with TNC [ 747.839737] sp0: Synchronizing with TNC [ 748.015414] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 748.023928] FAT-fs (loop4): Filesystem has been set read-only [ 748.024010] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:20 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) r8 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r8}, 0x0, &(0x7f0000000380), 0x0) r9 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r9}, 0x0, &(0x7f0000000380), 0x0) r10 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r10}, 0x0, &(0x7f0000000380), 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r11 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r11) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r12 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r12, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r13 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r13) r14 = open(&(0x7f0000000100)='./bus\x00', 0x14517c, 0x0) write$binfmt_aout(r14, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r14, r14, &(0x7f00000001c0), 0x8080fffffffe) 14:00:20 executing program 5: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x200, 0xb, 0x4, 0x4000, 0x7, {}, {0x1, 0x0, 0x3f, 0x2, 0x6, 0x5, "2dc8c96a"}, 0x8, 0x4, @planes=&(0x7f0000000040)={0x4, 0xffffffff, @mem_offset=0xc8f, 0x8}, 0xfff, 0x0, 0xffffffffffffffff}) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x3f) syz_open_dev$tty20(0xc, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f00000001c0)=0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x6000, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000140)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:00:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:20 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:20 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000040)={0x0, 0x0, [0x10000, 0x8, 0x1, 0x37e]}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) [ 748.579426] audit: type=1800 audit(1583676021.086:80): pid=5810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=17138 res=0 [ 749.181206] audit: type=1800 audit(1583676021.686:81): pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="loop2" ino=439 res=0 [ 749.187067] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 749.213151] FAT-fs (loop4): Filesystem has been set read-only [ 749.219255] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:21 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0xfffffffd, 0x0, 0x0}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x9) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000540)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') syz_open_procfs(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001180)=ANY=[@ANYRES16], 0x1}}, 0x20000810) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000380)='./file2\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="75707065726404003d2e3966696c65302c6c6f776572e569723d2e3a66696c726b6469723966c55021c7771c333934519d4163592e2f66696465660000ac0000df81b2e8c00b0000c8ddb10a3d7c1ea84d3601a6d53bb053a9df6d8cf0119a2f09b324b736b74ba5cc008000000000000047cf97f77a87016fb175a74baa38697bde4a7f9cfa0eb2789134d9e187c8511f16dc2cf4e34a4c5ed90cb209dcb736f977a800000000000000000700"/192]) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f0000000040)=0x6, 0x4) socket(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000180)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, &(0x7f0000000200)={0x6, 0x0, 0x300c, 0x1, 0x8, 0xfff, 0x2}) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x7) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x521000, 0x0) ioctl$EVIOCGKEYCODE(r5, 0x80084504, &(0x7f0000000480)=""/152) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000140)={0x349, 0x5, 0x4, 0x6, 0x4}) ioctl$TIOCEXCL(r3, 0x540c) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000040)) 14:00:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:22 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 749.663766] sp0: Synchronizing with TNC 14:00:22 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 750.234355] sp0: Synchronizing with TNC 14:00:23 executing program 2: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000640)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842ecf106f753fd868c06e89e8072772c3b9a980b15f26baee19a3d04c1918838613486553fb9ef4c61856d4e0152d28dd1573a18161b87f813530ce5a7165977680ad8366c101488b17680f27e5c6344e5ef20abd35a4aa3820d"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r11 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r11, 0x5457, &(0x7f0000000080)) r12 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r12, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r12, 0x5457, &(0x7f0000000080)) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 750.665727] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 750.674131] FAT-fs (loop4): Filesystem has been set read-only [ 750.680171] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:23 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:00:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) connect$pppoe(r1, &(0x7f0000000180)={0x18, 0x0, {0x1, @broadcast, 'nr0\x00'}}, 0x1e) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/4096) ioctl$DRM_IOCTL_MODE_CURSOR2(r2, 0xc02464bb, &(0x7f0000000040)={0x2, 0x101, 0x2, 0xfffff860, 0x40, 0x9, 0x43, 0x9, 0x8}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f0000000080)={{0x9, 0x92}, 0x0, 0x6, 0x80000000, {0x3, 0x3}, 0x20, 0x7}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x10800, 0x0) write$FUSE_OPEN(r4, &(0x7f0000000140)={0x20, 0x0, 0x5, {0x0, 0x13}}, 0x20) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(r5, 0x8004ae98, &(0x7f0000000200)) [ 751.105092] sp0: Synchronizing with TNC 14:00:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:23 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) quotactl(0x6, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)="be9c0418ee0fb6c186afcf5e294122f110b5f502472b5223c77dfe4c38d83c124df6bb610a607d6b81afcad9d109007875d7a23028039633cb3d32f60027774baa62d60cf83986689be832dc0ec5221e9298e37578") r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) fcntl$dupfd(r3, 0x0, r1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:00:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f00000000c0)={0x7f, 0x6, 0x1, 0x4, 0x7, "bef07960ee6c3dc81ceb7587a792d4cf5ef80e", 0x1, 0x1}) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000040)) 14:00:24 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20004814}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:24 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(0x0, 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 751.883564] sp0: Synchronizing with TNC [ 752.202558] sp0: Synchronizing with TNC 14:00:24 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x3, 0x19, 0x0, 0x0, 0x0}) [ 752.536113] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 752.544579] FAT-fs (loop2): Filesystem has been set read-only [ 752.550758] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:25 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xffff}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000c4}, 0x80) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 14:00:25 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/8, 0x8}], 0x1, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100079cb5628bf00000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f1b007cf75d2eb7dcac0500d0a9ddba8442462096655f041a677c77a90cf321c40ea9a26cbd7ed81e5cb156dd687110d5d863585024a3a7b75c0028a1de7393"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0xd, 0x0, 0x6, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x802102, 0x8) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:25 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(0x0, 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) fcntl$getownex(r2, 0x10, &(0x7f0000000280)={0x0, 0x0}) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000080)) pipe2$9p(&(0x7f0000000300), 0x0) kcmp$KCMP_EPOLL_TFD(r1, r3, 0x7, r0, &(0x7f00000002c0)={r4, r5}) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000080)) write(r6, &(0x7f0000000380)="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", 0x1000) r7 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x381080) creat(&(0x7f0000000340)='./bus\x00', 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x128, 0x1403, 0x8, 0x70bd28, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'virt_wifi0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'batadv0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth0_to_team\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond0\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'macvlan1\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x84804}, 0x80) 14:00:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 754.362653] sp0: Synchronizing with TNC [ 754.415669] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 754.424064] FAT-fs (loop4): Filesystem has been set read-only 14:00:27 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(0x0, 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:27 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000009c0)=ANY=[@ANYBLOB="ad5b858ef34f1f4c3c9eecfc77f64ec04332e96410ee09726581e968bb26140cd5bf3a3a9ebc5553538f056ce736f679a19483cdf885bcc62223e01e3038c0024837bf91f8835f0d75a453625fcf121605edb8e0ea0a14aad589968012a771a5072bdd705b1831e78867fbda66ea2febbab2303d02257b09c7624df79bef8aee0f7fc0109a5ffaf25a6886f724cc1218bf242725c0cc1cf4d781caa0a139a75c9090e23cc65d9cdeac44d8be7dfd46fdf6d6afa8203a5aa4bd059189d6fe7b08edd50f54d2e6c26a453c63d1c36482b15f21c98393f6f74d8542a8a2574e0ac893", @ANYBLOB="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", @ANYRES64, @ANYRESDEC=r4], 0x4}, 0x1, 0x0, 0x0, 0x24000811}, 0x20000002) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r10 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r12 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r11) keyctl$unlink(0x9, r12, r11) r13 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r12) keyctl$read(0xb, r13, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r13) r14 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r13) keyctl$instantiate_iov(0x14, r10, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r14) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r15 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r9, 0x0, r15, 0x0) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r8, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r16 = open(&(0x7f00000003c0)='./bus\x00', 0x9195182824a769f7, 0x5c) fchdir(r16) r17 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r17, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r17, r17, &(0x7f00000001c0), 0x8080fffffffe) [ 754.424160] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) [ 754.610570] sp0: Synchronizing with TNC [ 754.623979] sp1: Synchronizing with TNC 14:00:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2, 0x19, 0x0, 0x0, 0x0}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@v1={0x2, "1b71cc1897582ecfd4163bf8"}, 0xd, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/212, 0xd4) 14:00:27 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x6100c0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) [ 755.467014] sp0: Synchronizing with TNC 14:00:28 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x2, 0xb, 0x11, 0x100135, 0x0}) 14:00:28 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xfffffffffffff008}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="6653070000053c27afffb4aed12f0600000000", 0x13}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) 14:00:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x30) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x4) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x800) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0xc) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000080)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x35) 14:00:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:28 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:00:29 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) pread64(r1, &(0x7f0000000040)=""/144, 0x90, 0x1000) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40240, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, r3, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x9}, @NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x1}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x293}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x1}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x8}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3ff, 0xffffffffffffffff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x2c006040) 14:00:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$3(0x3) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000040)={'vlan1\x00', 0x3}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:00:29 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:29 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r8}, 0x0, &(0x7f0000000380), 0x0) r9 = add_key(&(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r11, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:30 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:30 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:30 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, r4) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x10) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:30 executing program 5: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x800) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000380)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="f6ffffffede24b17a2e2e61afc4f323df84a80f1ba85ea0a4d6e9a5d70ba01ca9e36cfd3d362750a06d65eccd09710d25c", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000000)={r8}, &(0x7f0000000040)=0x18) ioctl$RTC_UIE_OFF(r4, 0x7004) r9 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r9) r10 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="00faff00", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r9, 0x84, 0x73, &(0x7f0000000000)={r11}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000001c0)={r11, @in={{0x2, 0x4e23, @broadcast}}, 0x6, 0x0, 0x80000003, 0x3203, 0x7ffe}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000002c0)={r12, 0x6}, &(0x7f0000000300)=0x8) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x3, 0x1c, 0x62, 0x0}) [ 758.691713] audit: type=1804 audit(1583676031.206:82): pid=6286 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir494516759/syzkaller.eJzwiI/459/file0/bus" dev="sda1" ino=17339 res=1 14:00:31 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 758.997022] sp0: Synchronizing with TNC 14:00:31 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 759.328423] audit: type=1804 audit(1583676031.836:83): pid=6290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir494516759/syzkaller.eJzwiI/459/file0/bus" dev="sda1" ino=17339 res=1 14:00:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 759.398744] audit: type=1804 audit(1583676031.836:84): pid=6320 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir494516759/syzkaller.eJzwiI/459/file0/bus" dev="sda1" ino=17339 res=1 14:00:32 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b0a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc3874f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e58bff4d666456f693e0b868a011da94dad2326e1cec9fbb0e5dbbc68e05233afad928fb3a591b1e5ad0f7e567966e5edd0d5479971bf486c2f453bf96bfc04aba6a987c083d3a88fd4fd9e391243c04529f6e06d2bcae6ee812fed1cde8dbf379fbaacbce07dff4e1df7b13863aae1df80e4967055fedcba49962bfae67d1c5312df2c9c344d311c4ef7c8a13a54094db3ded687bfe2d81a99acbbac14e88aadf5a7ba5b7b9811b80ef55cacda10"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x100, 0x9, &(0x7f00000016c0)=[{&(0x7f00000000c0)="a9dd012976e98ffa983e917f46aa5a3fc80be920cd50b7a468ee26b806eaacd693357dd082bb27e23ee6a0ba0c7aa6a99c04a4926001e74b4f008d9e6013313d7305bced8cd24e457e631c190b2fc8837e17a1de407363494d7059b4b81d4cb6c6296e38a065c135c22992a937b456259d38f204f2e641f870bd4f544146103a10147d61ca01243bb4ab058066f1751fef37a00e32f82f9b08e6e98fadb69b91625f0cda817cefe664d71180cad60c8843635b412c3e324dffeb23582ac654", 0xbf, 0x6}, {&(0x7f0000000180)="3522b7f42e363d5584964b3211f0e5eeef23b0d144628b5dd0d91b520fdb55e71e5262", 0x23, 0x3}, {&(0x7f00000001c0)="fc1447a9a5eff6f9ba0003d1fdef8af5580c7dcd2b1a9c75d801b7dd2cca033f52696fced45721f3d8c9f43bb2cc85e4d57a46891adb5d1389b1dee3da20f25fdf4a5c9d015dcef362fef7f09830a57f681ad1427f062481ff38b33953221da81844fa86f0b906d6faba88b3b0f98283bda21466a350c13e8b3a4151aee0305cbc78d6d8fad9a6093a774220366ac4e2c5ef8cc8452d841e0c571c", 0x9b, 0x6}, {&(0x7f0000000280)="3212262b66b30ec3694a65af416e90ed4e817b70e64eb41b62e775b74e7df101cabd5ed5b83613009c464a5f160e4ee69f1a836950a0d878583031f8f99e3208dca74e4e1c37440e7a42e1f43eb3f51b8311ae794b5e32fc1e03be6c5d8b92e683282b413ee2de44b6790d3403067de32e43f8d72cef", 0x76, 0x4}, {&(0x7f0000000300)="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", 0xfa, 0x200}, {&(0x7f0000000400)="245b812b242cdb67931c85aa87a89316339b11bd4f9b2fd9de12e0c439203c27a11b2d5508db4fc1a608ccd3b5ae581f05283667ca9ab29792dc5f9c719c0dd33b6195090cb48a6671871b445959b30abb7065d6f88df7b5efa2a809673331f5e841c891738c6809c7ed9be4ef0dc4d530debd136e7ddb0c95ce682ebb960eeed74bb662141ee4e7cbcb7f3f5c7d7bb7ad02f3edad780cd1d34a9ecb48503f59ab5578eb4c6b9fa0de8d6dfcb1ef639a986fdfb71d466e005f7efb351f2b8c7d383444c92845f2a2c5e03fbe834aa3d40830bf85e36e187a", 0xd8, 0x9}, {&(0x7f0000000500)="e5c391d30f2698944b94f49075c6a41b3817a426f02bc96fa703028308d6efc0b55b1edb5d503ba3563610df65290b2d08f3a8c5d2cbfda43397c5147f49bab06fbe81ea2ef494a9aa1cc0061f772e3cc0394f9579b33bd76dc56475295e4795dc48306a7449a9df6811a01162a2ee7f3c173338c2f84ff07c24c770151cbd4c1c", 0x81, 0x100000000}, {&(0x7f00000005c0)="2f447d137de467344e26f30ef0d1e578cac92eebfe3697237955f61479e5ce7fcea308284728c994ea5db0ec78be6e12852e80e6e96bc102e785a7e4ab8b82b0d8718092ce6bacca1bd52b8a61f7da703d98a5473f96267c4fcbd4e14af862489bd9b2f9b165d6d6cb5500af192024f15fbd542069b426c0d25d385902090ff76edaccf9fac0e6a4a80744f33ec371c00f23c2364cd7e8c80d83e124ead73fc308c5f11c7d50fa207e3ee6d8afe14d2a30b16419704c189af36e27932a2570cd0e074789fb6b1b1766f474fed7de388b50171a4d62c36576432caacdf95764397fbe73e949e655e2ed4a92170399a5e860bbcea90cc7a497995f5deed3b68398aa72f7bdafd47fb80b01ede6427e14de21f37e9e50a5858362a32ece5eb178ee449d7edd431e3cc05ae02091c71177abde6a15a5351b632a2af36a6577de2ff62eca88d999f3263168bd7e35db607b2458e2d9b4c3c453ee92ac49b8f26abec70c2187b30c15c70439633952bc568d30b1c9944807a03d218d2e6a1e9300ecef719f1ad19b216128b4c00bb166d3dc59963a221d39546c3b1d9453b093dfa2ff2d0bd4b299e76f58a7c5a02792ea36bdbe3ee41ca9fb882f6548662cca52a62e69ef35aebc45554959785296aba4e6ab610da3e30ae12eacea751b0d9223732d1cc6debe699adb0a9c3458733da05b66bc879563aafe4174bd4a9bcebb59d0b5c8c6e4dad615ba4d5d6b2a5b92074e48ad29bbb26e1f9201a339f68190ec9ad4e4406aacda10ded518db5769a6cb77dd636efbc67220666c2acf29c9702f2218bc410d042572329763edebb955f403f66643e64626b6ec6acfb2d0226aa7a1aa69d6f556992bf8a11586bb3989d8e288913a0c86e9a439405a2f78b2378bd65bd4baf2dc70d135277f3d1be2dc0113721ef185033c5c2449ae5ba4b63de884b5ca17ccf188e51e8710481fb4a76d4fdf97d2531449c063bf237ba6eb1ff533d296703896827fd2548565f77f4def4306ebbd0f9e62e20528a792d2549fba9c55862e079da3f086d7b32f6959d004e38250defc2b955162e88d7d58424b7d64642baea413b3a51fc0b2a3234baf098301672cdf5527efafaebc84fe548003d45d50f4b2b71d8936f9f51737ce5fc978eaecff8dcc7040862202c3a950c10a04f69bd65744acc80254b7bce62d63151883d38bea19cbca0acbf6c1dcbf70d98cad695e01961aa66ff86cbc9912a07f86c29ee77545fb1fae5b44445519eb01c62726101750a4266493207ac03fc4af36b4c6e96027f7d3fc601ae9a292c10cf8423ca7cb1ff7638e8c072c918017b90cdd97a4cb90b5dcd4b1345901111f66345b011e865f2910c59d235ccd6342ad25e59c2bb84036bfa15f82f0848b8039dfb4a5058fabc0c40bbae8b24338287c13338fa94c40f10f2ca36b07dffc387203118e2591961205a90aad2ea5ea2d823a22a20fcb4e0e3bd4840819cfed9d5537edf09cda9b9a7c3908260e1aaaf967af366af3d7bc984c35206e1024caf2d3f694b0cbbdf6674b4a23565a37e6f11c70c17e31390143ee3cbf9f528aa28633cbe049b766c02e86176736211c6ec7be2239d625106fb5ada71231623d29fe3b536b0308935056daf4c7369caefbe562de2a9521d689710b928e624a44316ee6c7f3f6d3ed859a296a5f4d06a3f886c5035e8523edf2d5e4ce5d3fd74ffc28b86375b38dfa64bbae7de937ef938aea02efc6950da4700362501fcc9b0f05ee1809fa9f8e0829116ce6209d9dd3618c94acfea62b09cc08e40db9158d698120ad31de4a5c9bd52610973cec8abc876a87519ae4e139da5775c5cc86541ac4e06054d193daa64dcee08f59ea00991cdde05c23aa003b3d7ea0a4e09af863b96496bd356471917bad1f23e94fd86af5cfd5554773adf65348ca34d8a1ae9c826455809c702344eda662afef62c29d3aab0a35320c280c8db0dd34d3ec34759d729b1b722e89dc2ef8eba69d2a69309df27725406a91d50491dcfdf68adfed6f06e9597a00ed6683527360494b4977a847876a9a7ee0edb94fa4f4602129c513d113736cbd87b9089844dc3a1ad8e9ef7bae7a025d29d2f684690ac22e8c097f8cb12915d6ad5e499668f5719a8ddbd3b424cdcfe3ffb6fffc0dcc000a3f30946d85d6e9a5714a002f977115e6a70e803a2d8ac98315ec51b1fac1cb96ed9cdbed9fe352b96a4163ea1c12e82854b75c710545f1fd4c1bdd0c6f40124a6e8b1a56bc9502283aacfb02895a8d93de318c3678c94ddfb1b2838ad9c28ff02fd5a367d2e7e46c04430859f1d5e2074699ca049e7823ab3b7152287be7b80932b03a90e2f825cfe7c4a70ae9e65be206de6f0521d186650546757a2e0c15ae4f342270e90bd60b27883d50dc005350c1c6de8b77abd7ab3aeea9718e33ff9cd6ebfedc1368b351e5a11c3f670c2b823d988cd2f34c4a91cef66eb53f570d9c5701e82bcf1a7e0bf07a29d07830405edc88eee26bdbbf37ac37cf5428f657bbdfbf4aba7b18c3a3d1855028676d1a06ad38b65a70e35c0c936320e4fef4b0ec35a336399ea23e577d7aa7ff2ee4f9ba2a7787dedc6578605dda45c53b3cdf843759a6757b00e57f05752c49f390ddaf1dd018ae02bb3b2d3206b5e01043701bfc5f5139675713aa7a86d8932216ae19acb63f2bb96ccbc6a6df9b7e1ebd5b37210b792a59700bfe51883f33b8d5d1b8a34e8d1bec06a3260a254247afc9815446c04305c25736f8f680f3949e175ced184403f8c6317f83017bd00884b4a202ed442a340c131cfbef27950b207e96c239109609114675dc5e7351fa743bf860f7da0a28ee657bd36efcef5a5bdd8176cdf5f45f500f840fe1f40b05ce6ebb204b4b8fd83be5dcac9d2f8943b57242a1338807d1241597a4918bd5f51dc88e43ccc00acacddda1e3c69bfc65c0380e88d5251ee5b4a0ff672973fe110af01286c3a9043808f23b26bfa770adbbacd76d5f0b0ecb434ae3e53504723a16f49a1cdfb23d9d84ec60ad7832364c51252917297d997ec331da2996cb37d355edad9bb688a4de0e0c26350709cab79107e6b0ef7e7c7f704a6d57192e95ae73ca1f4043bda54ab1ef2fddd30627cca13c5c5f85d3f6bccf0f36e7aa790bcd562d088bc2bcabd5dfab9d83c70ad4c1dd67bbe89cb748c9ac30bf576c425011f3d988c87274a1790137155ca0057d3be0cf1dfe3f67e02cf974cb8019e4771d67708bd0aaf066dd6b261bac971e45e70621bf7ce72ad707831391179b46a11876b40e188c31641a39d7677c45adca3c01484accdc5992fd16176f6fda35503cbccdd56689bd50edff32abf0e1534477424a4fee0fb28c6f13c729e85e8efc99a41368b62ca9c689e307eeb56a862dd9a730fb4755960cae81e0f8f3119916344101115eba5fb73721028858a43ecb66b74ea8d7133d668144876c83104dcf05f4708b1e0995f4f77f55c973cd4678883e50793c105c6ba806ec1d61e388e7370f115759bfd60c5e14e2bab06d830d2de30446b44102e76442ab7144626288f27f399fddf316e2a239b82e11e0ab7508e6c4912b17008f8d7fa55e2081e34c2c04622364bf836da2842f6dc2010d791535c35ea414aee82c0eeaa91c276827c99ca824adc1115fe41aa00e803e3152c2970c764829233b7560aeb3c5ef97a73f77f9a942a7e681806392eadd6bc98fac193e44a25c7e1da0fd83428ce5ed5812e6fd6b9b3a9e8ac754f073c618e7d2b10be7b49b3e337aea9f7aab80403f7b4ba23673c7075f60da8b22c3be8f0dfed66d508ae783d8456bd72169b2cca350d557cad56b8117766e737fad2c2b81fa8ab2cbdeeb2918603742633aff773f808e7cd86d59ee4ef9ef94669a95931ad5385c382881d75855d090ef0c507ba556621a91a0fd3de6e0f57068e1794d2d1919fa65e98e5b709552eca7104840765ae8d20505d5e8bc4a417dae823127a8afee6961c2a937b63f3cb2ba17173c0ddad0423d4e2060c083c8d7ac6d7127fb2905315891c06509db0c14daf77ac28f42459b1fd5e8bcca9c3dad750a54cb6dd2880e95f8e8aa87137bf52f1204c2e3e7f71da40fef93c25b88c7182fd9ab2ad45f34a57a52c511a50edbe6070f0dba0048651aff40cda34eb4c206f6f12d0b7c7d94ec024f219a5d77f1fa919df4e049bba442b714a5d3c6459e82124b05111a9220a7b9e41e0d8789369c680bba271a9f9e1a820b94efa1433f3119a586a51828be7720c2effafd7bcf8d5aac2faa4e163a6e96e3e18e9076d21847b08f460c0db1c368b33ba467257cddecf2c61d320e8a8683f323506815a8b61add8eb8fe99394c4116315364502d9a0f66b90ee0beffc1bb817f4414541f6c6b859a4a3abed589f290224725c67449f0d0d3b0eea83fd03585d647ac15c442ecd8263897280a2d4bece94c581ce20b968c371899d6eb32f9b86b172998ab62f114113bf81cba7b49239d7bee6a7271355742d2f4710858533b6424f6c0aee9664640607c9755dc6229630819ae6276cce688d54af3773d2fa936a31bc009dcd8fd67838c63f9e9e51392c273c3c8e00ff8385e2301908b42f382a8d5dc7aaa6380f38dd8268652b5c13f0fda40beebb15ae502f1bb5e323f272250d4889d924ceab92d81bc66c45619bc26fa67983ccb1453df1b64d8872eeacbb113daa42a091773c1a7e5d96971ad0b8487ab79e3b6921c0e477b72a6a630642b42f9b7c830a3808e473df6284293dad515a4442bbde72bf1ac554f75872f76033d952e55c23efdedcae90e295f91f66c9a99bcd58b2c4e80216a2d0f0233a9338dd5cb643cbd35e6060338addb316eab54dc53c27a2e21eb0b3b5a099ba9e42044c617e0e25c536bd726c99919b84540300a9ba66429d582a518b72ac51ff40045c6246dca97535a5e59896f25d9314a1e11f01ce09be04e7aa90809d878d5ee4b3bdbf8baba230dbe58a70bdd080528b6b0c281b9703af3d53d41869382648dc39c47b4dcdf65617f85a7618261c27fc7c6832f3040ca03e925ff1ed9fcec826b98eaaa88d1256e723c0b916b4cf8523b49770c36c43e8d6046005b74069dadc7c7dc93883c37353605f39269952b62a6128612745f4dcfa581ac8d0c23216a4ce8bd8bdb4c2e37fe5e18b829c2d3de28ba731b47895b30fb556f911d82e15e82434fd7b219e54d195ab66f2534870d84bb70dbcbf6cb15a506c5f42f5b7582ff7348be4815785caae0c54c9abef109e7b80f07b1b50c421416f7ff1fef00f255f54d877e8a626dabb0460217ae6b4d1c27d1bafa02b0ed314a8b822890f15ae2ca74e130f1d6d96a3524512c75f4c458bdac114ffc8c177fc6b1fa47422cfbe9649a28c7fad1b78b2b19a3b0f78b7d3b2612139a64b4b055f7c3d70bb904de3fd0a25c2c97c45766e30fe5316bbf60463478f9a2c12f496f02c74d84eef5cd2eb5f3da8d295116b4e799b61cb31577ee85b28eed6d3e29f0953833ba8be600ea43a5d2fc2e8dce8c0c4602a6c84a1bd2e42488a02f2c499bd7e547a2f473e6b8cde57d32bb4a0316d4bee03f2806690afc260669cf272cc98c015d9f8a5fca073c84a07e4c8512529b2f078709308a27439e06a5730625b2fa564c7c11c12f9f150ed146afa3d62b223f5691155b9b8b11cad8b3cc0b83d7d9bf4835c0e1f922e88c0e782fe8b6f069f767b3963b4537358dee1052dde214c53fc0fb1196398a6f9d8f6da368643e4960cab38d825d06840bfe529d7d76d04255dec3a4f8d0446094ddab", 0x1000, 0x4}, {&(0x7f00000015c0)="b13c0423ef2fed83f70ce53e016eece75e06590a9b222d33b3c5cfeea1160da5558917ab7ef037ad4bc71d2754f56d2c398141d914353a8f6d52cebeae98f7bb947c0aadc66e73d612c73176f48b2a1ffe934bb6b4bd8fad5ac59e9e85a66851949a46af302fda1b417149ab49163033e6dcd6ce31e68fae42a1045e32bc1e6af2caec06dc8d4ff8ffcc1b2a94fe293b2ba9747d72e5cf7a52d4aa0584cbb27f0e50efeae91230565aa2df9e2b9ab45cd97374dededbe87df1991925de8e49e57dbcce66b492c3570443458ebcb55e27c229193bb97ff4d50388ae88c2da11d97fec1a7df299774f", 0xe8, 0x8000}], 0x800, 0x0) [ 760.043029] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 760.051646] FAT-fs (loop4): Filesystem has been set read-only [ 760.058063] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:32 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 760.195287] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 14:00:33 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:33 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 14:00:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x50000, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x2, 0x10001}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) ioctl$TIOCCONS(r0, 0x541d) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000240)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="f0d128bd70e30400"/22], 0x1c}, 0x1, 0x0, 0x0, 0x40012}, 0x4008801) sendmsg$SMC_PNETID_GET(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r4, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 14:00:33 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 761.317209] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 761.325750] FAT-fs (loop4): Filesystem has been set read-only [ 761.331885] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:34 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:34 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$unlink(0x9, r5, r4) r6 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r5) keyctl$read(0xb, r6, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r6) r7 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r6) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r7) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r8 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r8, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r9 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r9) r10 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r10, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r10, r10, &(0x7f00000001c0), 0x8080fffffffe) [ 762.354563] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 762.363246] FAT-fs (loop4): Filesystem has been set read-only [ 762.369350] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:34 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:35 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x61d15a6f, 0x2001) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000240)={@fixed={[], 0x12}, 0x4d}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0xc600, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) close(r2) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x0, 0x5}) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @local, 0x5}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)="8c", 0x1}], 0x1}, 0x24014044) setsockopt$sock_attach_bpf(r2, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r3) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x626000, 0x0) rt_sigaction(0x0, &(0x7f00000001c0)={&(0x7f0000000100)="8f49009a4b0041ef66440f38108dbf4e44d5f20f447334c4e17bf03430c4227d31c3f244af0fa0663e47dae9f2ad", 0x80000000, &(0x7f0000000140)="264383035e8f4878c0f8053e0f1d92e5f50d1a36834efe4cc40115dbf08f0868cfb1963200000fc462e937cec4c29db79299899999c442d9a8b8a9780000f00fc78f3c6b0000", {[0x80]}}, 0x0, 0x8, &(0x7f0000000200)) 14:00:35 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:35 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0xffcc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYRESHEX=r1], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x20040004) prlimit64(0x0, 0xd, &(0x7f0000000280)={0x2, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$unlink(0x9, r9, r8) r10 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r9) keyctl$read(0xb, r10, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r10) r11 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r10) keyctl$instantiate_iov(0x14, r7, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r11) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r12 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r6, 0x0, r12, 0x0) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x10000018, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r13 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r13) r14 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r14, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r14, r14, &(0x7f00000001c0), 0x8080fffffffe) 14:00:35 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 762.984361] sp0: Synchronizing with TNC [ 763.121614] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 763.129906] FAT-fs (loop4): Filesystem has been set read-only [ 763.136528] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:35 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 763.402944] syz-executor.5 (6440) used greatest stack depth: 23328 bytes left 14:00:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000100)=0x4) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000300)=""/4096) setsockopt(r4, 0xfff, 0x2, &(0x7f0000000080)="64a29560d19b7c008030a1c5a58f34204dcf657658bff166d1a66998191f6a87cdc3a910b7f49e99e45e59b50c07e9127e59a39b2844761a5594aee46e0147999956df32f2597dabaedcb2", 0x4b) ioctl$SOUND_MIXER_READ_RECMASK(r3, 0x80044dfd, &(0x7f0000000040)) 14:00:36 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 764.034352] sp0: Synchronizing with TNC 14:00:36 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 764.201906] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 764.210275] FAT-fs (loop4): Filesystem has been set read-only [ 764.216365] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:36 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/318], 0x1}, 0x1, 0x0, 0x0, 0x20000851}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0xffffffff, 0x9, 0xfffffffffffffffc, 0x0, 0x4000000000000, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r7}, 0x0, &(0x7f0000000380), 0x0) r8 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$unlink(0x9, r9, r6) r10 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r9) r11 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r11}, 0x0, &(0x7f0000000380), 0x0) request_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='\x00', r11) r12 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r12, 0x9d}, 0x0, &(0x7f00000005c0)="533a126458ce8663ef72db4b84df3e188cfd1ee7fc22354d1801b9885aab1e4c895aa5bf1cfdc4ebbe30e748d6432d949a6a7f67ffaeba8dfac795945506edd1901d7685749944c35ba6effabc4f6b486d5bd4440025f37a78b7ebf086e60571e4644e109c1964b3bb0fedbf639421f93daae8ccf042e8eb70d408a016bed8252a6b7c499b1abbc6c0879c63020f2658feb2059923d245ac37e9e10960", 0x0) keyctl$read(0xb, r12, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r10) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280), 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r13 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r13, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r14 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r14) r15 = open(&(0x7f0000000580)='./file0\x00', 0x14107e, 0x88) write$binfmt_aout(r15, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r15, r15, &(0x7f00000001c0), 0x8080fffffffe) 14:00:36 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:00:36 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 764.677411] sp0: Synchronizing with TNC 14:00:37 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 764.795321] audit: type=1804 audit(1583676037.306:85): pid=6535 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir494516759/syzkaller.eJzwiI/464/file0/file0" dev="loop2" ino=449 res=1 [ 764.889314] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 764.897800] FAT-fs (loop2): Filesystem has been set read-only [ 764.904209] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:37 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:38 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRESOCT], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 765.460943] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 765.469396] FAT-fs (loop4): Filesystem has been set read-only [ 765.475719] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:38 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[], 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 765.699864] sp1: Synchronizing with TNC 14:00:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 766.291869] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 766.300349] FAT-fs (loop2): Filesystem has been set read-only [ 766.306407] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:38 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x61, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYRESDEC=r0], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x40001) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, r10) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 766.897377] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 766.905816] FAT-fs (loop4): Filesystem has been set read-only [ 766.911927] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:39 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[], 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 767.228614] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 767.237370] FAT-fs (loop2): Filesystem has been set read-only [ 767.243868] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:39 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:39 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="2700000a0c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a953d3402646da4515875289f1b1a5ce515e339a0e2d442b1929bf78663c5c09f65e3a7613e9e5fd3cc34f0b007cdce180fedcac0500d00100ba844246c0b25e4e42ffceb0248ade46b4c5fc2ae9c22909d7a62f7441d7eeea9cf05fd01476b40626c4ce752175d032c652ffd88aa856475854059e9da12034a18350952249d86a6057baa03f7db96d39e889a41e505cc6ac3a8f9a22408fc57f696ac30a0430dfa5cd207002a8890f4c87743c20b7d1ddf9b7673cfb8106c1e85654b7e6aeb741cdc344"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:40 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[], 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:41 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:41 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r4}, 0x0, &(0x7f0000000380), 0x0) r5 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r5}, 0x0, &(0x7f0000000380), 0x0) r6 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r10 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r9) keyctl$unlink(0x9, r10, r9) r11 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r10) keyctl$read(0xb, r11, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r11) r12 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r11) keyctl$instantiate_iov(0x14, r8, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r12) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r13 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r7, 0x0, r13, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r14 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r14) r15 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r15, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r15, r15, &(0x7f00000001c0), 0x8080fffffffe) 14:00:41 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(0x0, 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 769.046893] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 769.055373] FAT-fs (loop2): Filesystem has been set read-only [ 769.061404] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:42 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:42 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000640)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f00000009009b4dc50b7a320000000005000100070000009946a6170d3c20000000f8a8c7928e256134a630141757a9f1b1a5ce51a54125002d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcbc80c58864ddba844246c0b25e58427eaddd39a6c5c363525b4d6b5e35601930ce264fd6b3286b70ad379f9169c09fdc22f988b1455be8d3aefede129208647a08e9260ec7dc4f8a4056d9022926a2cf10bcc812b4e3d02852b88b03a514356bb26e269373f1c2ac6bb46383"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x5, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000480)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r6) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x1, 0x11, &(0x7f0000000140)=[{&(0x7f0000000100)="000100ff7f00004e1ab739874751db19bd4e31732e7400020401ed01000270fff8", 0x21}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:42 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 769.579362] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 769.587762] FAT-fs (loop1): Filesystem has been set read-only [ 769.593801] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 970769) [ 770.016708] FAT-fs (loop2): invalid media value (0x74) [ 770.022265] FAT-fs (loop2): Can't find a valid FAT filesystem 14:00:42 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(0x0, 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:43 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 770.606212] FAT-fs (loop2): invalid media value (0x74) [ 770.611649] FAT-fs (loop2): Can't find a valid FAT filesystem 14:00:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:43 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:43 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(0x0, 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:00:44 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001880)=[{&(0x7f00000005c0)=""/70, 0x46}, {&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000100)}, {&(0x7f00000003c0)=""/5, 0x5}, {&(0x7f0000000700)=""/249, 0xf9}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/120, 0x78}], 0x7, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='rxrpc\x00', 0x0, 0x0, 0x0, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:44 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:44 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:44 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 772.322642] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 772.331414] FAT-fs (loop4): Filesystem has been set read-only [ 772.337412] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:45 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000480)=[{{&(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000007c0)=""/229, 0xe5}, {&(0x7f00000005c0)=""/140, 0x8c}, {&(0x7f00000008c0)=""/96, 0x60}], 0x3, &(0x7f0000000940)=""/4096, 0x1000}, 0x7f}], 0x1, 0x60, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000001940)="ce13ad46b3412b56acc6cdd5e57f7d0e6e53cb33eac65d6306fb704c472ba7142930aa08f9bc3bc79ee84c1556aee122fe20628beae0946fe126f2d94c0ef2f84b2499f0373a234e99ed160977b7e04a586a677904a38b057dfa32028e51666b5cdcd8a0365649c01ea635b83420fbba99e5bb7d3bafda99bac5f05a4696afde4c476cb7af2558619876c33c10b7f3e828db26322b4cdc06ce173bdf9a1310e4c4cdbe7889618628e2f8376edea0ec2981a0e2c770f3b7b56ad2763c7fd012ea25523ecd7c2ef4", 0xc7, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x3, 0x10000000000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[], 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r13 = socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r13, r12, &(0x7f0000001a40), 0x8080fffffffc) 14:00:45 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x1, 0x8, 0xb5, 0x0, "36a6538048755d15550c947d60902e9d2069bb43adc97e1baf7104620f2219a3"}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/4096) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000100)={0x0, 0x80000001, 0x1ff, [], &(0x7f00000000c0)=0xff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000300)=""/4096) r5 = openat(0xffffffffffffffff, 0x0, 0x0, 0x40) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000001380)=""/246) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f00000001c0)=0x44) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(r5, 0x4008642a, &(0x7f0000000100)={r6, 0x18}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000001300)={r6, 0x1, &(0x7f0000000200)=[0x5], &(0x7f0000000240)=[0x5, 0x4, 0x633d, 0x6], 0x21, 0x8, 0x2744, &(0x7f0000000280)=[0x4, 0x2, 0x0, 0x8a, 0x9, 0x8e1c, 0x1, 0x2], &(0x7f00000002c0)=[0x5, 0x6, 0x8001, 0xffffffff, 0xa4, 0x1, 0x0, 0x9]}) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000140)={0x9, 0x1}) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000003b00)=0x0, &(0x7f0000003b40)=0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000003b80)={'wg2\x00', r7}) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r9, 0x80404521, &(0x7f0000000300)=""/4096) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001340)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r10, 0x3b70, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x8000007}) 14:00:45 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 773.299235] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 773.307824] FAT-fs (loop4): Filesystem has been set read-only [ 773.313896] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:46 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, 0x0, 0x0, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:46 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r1, 0x540a, 0x0) 14:00:46 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) r8 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r8}, 0x0, &(0x7f0000000380), 0x0) r9 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r9, &(0x7f0000000100), 0x0, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x1, 0x19, 0xa, 0x0, 0x0}) 14:00:46 executing program 5: r0 = getuid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000001c0)=[@window={0x3, 0x6, 0x70}, @sack_perm, @window={0x3, 0x182, 0x6}, @sack_perm, @timestamp, @sack_perm, @sack_perm, @timestamp, @window={0x3, 0x6, 0x3}], 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x10a000) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x64, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x2d}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1f}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @remote}}]}, 0x64}}, 0x20000004) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x8) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000080)) write$vhci(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="0292041370cd0048059906008ded21acd50454fb4b273fd5073ed4e77bdc9a67dff2d8755c4600711627ee7e9c61867a5c92f4206f46448cc59fa362137a4239edea8881544a7e0ac1744447d0c6ff81c22b78a018f683fc8d96a4277967a8fe82c9ff346764fcaef781c35e069821896acb9405bb8cfbc4682ebb3cfeeae11b1ad6b08ed5100000000000000fffcb93215d40f163b8b4cebd603d16ad837c92e3f4bb2c1eb7e2be65f3212817999de82b710a3c34e7972b7d26dea1f80ae08fc415a0e80e39de97722727d7f1a611532881d5f4d8", @ANYRESHEX=0x0, @ANYRESDEC=r5, @ANYRES32=r0], 0xffffffffffffff7a) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000000)={0x1, 0xfffffffc, 0x16, 0x0, 0x0, 0x0}) bind$vsock_dgram(r4, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @host}, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCNOTTY(r6, 0x5422) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000180)={0x5, 0x3, 0x4, {0x658, 0x8, 0x9, 0x14939dcc}}) 14:00:46 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 774.325152] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 774.333623] FAT-fs (loop4): Filesystem has been set read-only [ 774.339993] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:46 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) [ 774.559381] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 774.568245] FAT-fs (loop2): Filesystem has been set read-only [ 774.574703] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:47 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, 0x0, 0x0, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:47 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="270000000c06010800000000000000000000000805e243000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928effff34a63014175ba9f1b10e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842b84484e417b956771fddaddbd82567ae05a197036f57"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 775.358260] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 775.367480] FAT-fs (loop4): Filesystem has been set read-only [ 775.373980] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:47 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) 14:00:47 executing program 5: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0xfeffffff, 0x19, 0x0, 0x0, 0x0}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) write$P9_RGETLOCK(r0, &(0x7f00000000c0)={0x1e, 0x37, 0x2, {0x0, 0x8, 0xfffffffffffff001, r2}}, 0x1e) 14:00:48 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r1, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x4880}, 0x800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000300)=""/4096) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000080)) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/status\x00', 0x0, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r8, 0xc0286405, &(0x7f0000000900)={0x9, 0xff, {}, {0xffffffffffffffff}, 0x100000000, 0x1ff}) newfstatat(0xffffffffffffff9c, &(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0}, &(0x7f0000000a40)=0xc) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) statx(0xffffffffffffff9c, &(0x7f0000000a80)='./file0\x00', 0x800, 0x2, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r16 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/vcsa\x00', 0x2, 0x0) r17 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r17, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r17, 0x5457, &(0x7f0000000080)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r18, 0x407, 0x0) write(r18, &(0x7f0000000340), 0x41395527) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c40)={0x0, r18, 0x0, 0x6, &(0x7f0000000c00)='ppp0!\x00', 0xffffffffffffffff}, 0x30) r20 = geteuid() lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = getpid() sched_setattr(r22, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r24, 0x407, 0x0) write(r24, &(0x7f0000000340), 0x41395527) r25 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r24, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r25, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r26, @ANYRES32=r27, @ANYRES32], 0x8d) r28 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r28, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r28, 0x5457, &(0x7f0000000080)) r29 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r29, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r29, 0x5457, &(0x7f0000000080)) r30 = syz_open_dev$sndpcmc(&(0x7f0000000e00)='/dev/snd/pcmC#D#c\x00', 0x5, 0xa69c0) r31 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r31, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r31, 0x5457, &(0x7f0000000080)) r32 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000e40), &(0x7f0000000ec0)=0x60, 0x80000) r33 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r33, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r33, 0x5457, &(0x7f0000000080)) r34 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r34, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r34, 0x5457, &(0x7f0000000080)) r35 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r35, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r35, 0x5457, &(0x7f0000000080)) r36 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r36, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r36, 0x5457, &(0x7f0000000080)) r37 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r37, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r37, 0x5457, &(0x7f0000000080)) r38 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r38, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r38, 0x5457, &(0x7f0000000080)) r39 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r39, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r39, 0x5457, &(0x7f0000000080)) r40 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r40, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r40, 0x5457, &(0x7f0000000080)) r41 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001140)='/dev/dsp\x00', 0x12041, 0x0) r42 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r42, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r42, 0x5457, &(0x7f0000000080)) r43 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r43, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r43, 0x5457, &(0x7f0000000080)) r44 = signalfd4(r43, &(0x7f0000001180)={[0x1]}, 0x8, 0x800) r45 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r45, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r45, 0x5457, &(0x7f0000000080)) r46 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000016c0)='/selinux/load\x00', 0x2, 0x0) r47 = syz_open_dev$video(&(0x7f0000001700)='/dev/video#\x00', 0x5, 0x412800) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001740)=0x0) r49 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r50) statx(0xffffffffffffffff, &(0x7f0000001780)='./file0\x00', 0x6000, 0x7ff, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r52 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self\x00', 0x102, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r54 = socket$inet_udp(0x2, 0x2, 0x0) close(r54) splice(r53, 0x0, r54, 0x0, 0x8100000, 0x0) r55 = socket(0x840000000002, 0x3, 0x200000000000ff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) sendmmsg$inet(r55, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40), 0x0, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xa0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r56, @broadcast, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x68}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{0x0}, {&(0x7f0000002100)}, {&(0x7f0000002180)="6209ed67941216fdf598146857a68b5a81019042838b95e9512b2b0641e40e569df37b073c12353fc2b9014cb0a3", 0x2e}, {&(0x7f00000021c0)="857bc0bd4d221353bcdbb9b4ffc9fc825e79ab2508b87a902028f0b971dee8b8180b46629feb2882", 0x28}], 0x4, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"/1313], 0x521}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="98c45fb1f9d40ffa9b8ef0", 0xb}, {&(0x7f00000023c0)}], 0x3}}], 0x4, 0x14006081) setsockopt$inet_mreqn(r54, 0x0, 0x24, &(0x7f0000000100)={@empty, @local, r56}, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r57, 0x407, 0x0) write(r57, &(0x7f0000000340), 0x41395527) r58 = bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1, 0x7, &(0x7f0000001900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a2bc91f, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x6e}, @call={0x85, 0x0, 0x0, 0x77}, @alu={0x7, 0x1, 0x9, 0x9, 0x8, 0xffffffffffffffe0, 0x1}, @exit]}, &(0x7f0000001940)='syzkaller\x00', 0x8, 0xa4, &(0x7f0000001980)=""/164, 0x40e00, 0x5, [], r56, 0x10, r57, 0x8, &(0x7f0000001a40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001a80)={0x1, 0xb, 0x6, 0xffffff7f}, 0x10, 0xffffffffffffffff}, 0x78) r59 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r59, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r59, 0x5457, &(0x7f0000000080)) r60 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r60, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r60, 0x5457, &(0x7f0000000080)) r61 = socket$phonet(0x23, 0x2, 0x1) r62 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r62, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r62, 0x5457, &(0x7f0000000080)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r63, 0x407, 0x0) write(r63, &(0x7f0000000340), 0x41395527) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r63, 0xc0502100, &(0x7f0000001b40)={0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r66, 0x407, 0x0) write(r66, &(0x7f0000000340), 0x41395527) r67 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r66, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r67, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r68, @ANYRES32=r69, @ANYRES32], 0x8d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r70, 0x407, 0x0) write(r70, &(0x7f0000000340), 0x41395527) r71 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r70, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r71, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r72, @ANYRES32=r73, @ANYRES32], 0x8d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r74, 0x407, 0x0) write(r74, &(0x7f0000000340), 0x41395527) r75 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r74, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r75, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r76, @ANYRES32=r77, @ANYRES32], 0x8d) getgroups(0x9, &(0x7f0000001c80)=[0xffffffffffffffff, 0x0, 0xee00, r69, 0xee00, r73, 0xee00, 0xee01, r77]) r79 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r79, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r79, 0x5457, &(0x7f0000000080)) ioctl$TIOCGPGRP(r79, 0x540f, &(0x7f0000001cc0)=0x0) r81 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r81, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r82) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r83, 0x407, 0x0) write(r83, &(0x7f0000000340), 0x41395527) r84 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r83, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r84, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r85, @ANYRES32=r86, @ANYRES32], 0x8d) r87 = getpgrp(0x0) r88 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r88, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r89) newfstatat(0xffffffffffffff9c, &(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001dc0)=0x0) r92 = geteuid() statx(0xffffffffffffffff, &(0x7f0000001e00)='./bus\x00', 0x1900, 0x10, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r94 = getpid() sched_setattr(r94, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r95 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r95, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r96) r97 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r97, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) getsockopt$sock_cred(r97, 0x1, 0x11, &(0x7f0000001f40)={0x0, 0x0, 0x0}, &(0x7f0000001f80)=0xc) r99 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r99, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r99, 0x5457, &(0x7f0000000080)) r100 = syz_open_dev$rtc(&(0x7f0000001fc0)='/dev/rtc#\x00', 0x558, 0x2d6a02) r101 = socket$nl_xfrm(0x10, 0x3, 0x6) r102 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r102, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r102, 0x5457, &(0x7f0000000080)) r103 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r103, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r103, 0x5457, &(0x7f0000000080)) r104 = getpid() sched_setattr(r104, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r105 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r105, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r106) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r107, 0x407, 0x0) write(r107, &(0x7f0000000340), 0x41395527) r108 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r107, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r108, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r109, @ANYRES32=r110, @ANYRES32], 0x8d) r111 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r111, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r111, 0x5457, &(0x7f0000000080)) r112 = getpid() sched_setattr(r112, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r114, 0x407, 0x0) write(r114, &(0x7f0000000340), 0x41395527) r115 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r116, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) statx(r116, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r114, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r115, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r117, @ANYRES32=r118, @ANYRES32], 0x8d) r119 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r119, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r119, 0x5457, &(0x7f0000000080)) r120 = syz_open_procfs$namespace(0x0, &(0x7f0000002740)='ns/time_for_children\x00') r121 = syz_open_dev$tty1(0xc, 0x4, 0x2) r122 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r122, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r122, 0x5457, &(0x7f0000000080)) r123 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r123, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r123, 0x5457, &(0x7f0000000080)) r124 = openat$audio(0xffffffffffffff9c, &(0x7f0000002780)='/dev/audio\x00', 0x210002, 0x0) r125 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/dsp1\x00', 0x41, 0x0) r126 = getpid() sched_setattr(r126, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r127 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r127, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r128) r129 = getgid() r130 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r130, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r131) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r132, 0x407, 0x0) write(r132, &(0x7f0000000340), 0x41395527) r133 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r132, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r133, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r134, @ANYRES32=r135, @ANYRES32], 0x8d) r136 = getpid() sched_setattr(r136, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r137 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r137, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r138) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002c00)={0x0, 0x0}, &(0x7f0000002c40)=0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r140, 0x407, 0x0) write(r140, &(0x7f0000000340), 0x41395527) r141 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x20500, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4000, 0xfff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r140, &(0x7f0000000640)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r141, &(0x7f0000000780)=ANY=[@ANYBLOB="8d0000007d010000006e00040000800000010200000005000000000000000000300005000000020000000900000000000000030073797a20005e6d643573756d766d6e657431242773656c696e75785e76626f786e6574312f0a012f6465762f7a65726f000e006e65742f6d6366696c74657236000a006e65742f726f75746500", @ANYRES32=r142, @ANYRES32=r143, @ANYRES32], 0x8d) newfstatat(0xffffffffffffff9c, &(0x7f0000002c80)='./file0\x00', &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) sendmmsg$unix(r4, &(0x7f0000002d80)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000140)="b01771f3dc31d5ebe4d8ece08ea096e694d1aa59f9d4b82326ad1b99a9cba96424791ece98edb4f3dff8dfc2582b619dbfc7dcf29e8d4179482f007c1b80c927c1c24c71621d798c9f0270581001f7080267fa4f3d04075c502cfbb36ab3f7cb896fd71b4c6251ad25f64e4cba8b126bb4374fbb4424c42c9b524d427de125a7c3467696a8b3136d8b840cac6d067b879ce15589581322a35d70e1ec546d49ed7dd553777efd9f11a43e45400178247e517327df0113d7", 0xb7}, {&(0x7f0000000280)="014edf44f43066cffcfeb73bc43762a5a34c7702ceac3b44e5dac32f2af2a5987c1ed735ebbcf79256716a27078bdbcf0f2d57674c08b18c40d5d9928aedffa3e79e22a1b4834dc928099ca928818acb184e578b4258fa54ae0fa2f539fd052a88", 0x61}, {&(0x7f0000000440)="54dbd683860e5334459e166b2ec39d92c784f98fbc67b55b6926efa8aec6a4624ccd0ad231fda2ef40362d8c97c5f24d813898fc09800fecbd6927abb566e7ebd7cbd96b0db75886d2cf46f273ef522dbf07addbde3de62717adf49d94d222d4994a32907e35e120f2d5680eba63fd919832b40a0099a7bde557608f6f4ae83118c7957bc8629f8d500c7e13d5beb19baf88cf55d51e0d658d86a19c438e05fb7d66ee3579915aab119a1d706202117f15c87d6ac226a204fa27a88285c19913d3419fade5195ec671d2fc8748414258910cdba0940da02559556fe5d19489f19510f7d82192d3b657395ab541807bf90a5f145e23a6a64e84", 0xf9}, {&(0x7f0000000540)="9f09e5790e4d1ce0bfae41acff4a95832f01a4e9defd1798b59b54e5072c7ae42236bd28ff424a36d5d2f0086277f1c4734b0ff39080b329f5c7f0fe1a206f323903bea90531500aefe6b1e5d7a141148b44067dd26b9c83c5078c11a9f87d628c1cbbfc91e380cba9772a", 0x6b}, {&(0x7f00000005c0)="a5d460edfd847158110f821cc223993b05688ad6e4c7b95af4007b62b62049845ad0e87f4be0391a2f8fcb0566a7e9a1397ac64072a96639f8a77121815f13b27cefe9fe1a1867319e3ef0beb51fd8acec6ab2e0e43727d80ff3016adab57286abb52ef2c7149a6f22f5373d2c8069cf42de739cae8b460ee22e17130a3f37fe94b525d30cad6fe6841fb822a6aacf219b5c0421c47029702f105cdae26a85e690e1b8160bb425499202bb83de6c9ea4e212a207368fa6d58f6e0920c35c71e3fb8911799e0a31b1ce8b0baf657bf6621ad96296edc376dd4adb339271197fa4eb8881908e0102ff86fe1991dbebe3dcccc9a6cb3e5a58", 0xf7}, {&(0x7f0000000200)="91183cd2b0bf64ab2529af82808b723c335ed294c2099f549b044f4a517b2b420c240c", 0x23}, {&(0x7f00000006c0)="c89d2d7d2465005256fe818b4e7389712f1037cf6a23ab12863c47248b38763093ac6a186d31b01314d7e45748990c085010c10cd2b46399c21c73d2dfa8f540baa7ceb0727c69dbe2108da827c00dd2151aff1723dfdc2febeb57d6ca7d8ce8e2189c25375e131564b74d257898c5d89ad7432bce8a145e1bfdb113cdb744ec91fe5f16a1d939a7dbf137fedfdd912e6816a35129def5c5f7771b194a4f3e9b2c2a53e45fc79c8176247ca9451db1e0c8cc1e9b6b331a298af01ede65bcb451185c59de90f723", 0xc7}, {&(0x7f00000007c0)="82d9e0f504be0f8a91670a9c4f1ee046ad5a3edb357960fbcb4ab51c577040a5bfe6fe44fe2aa487e2e352afc4cbc1480f2367340bb3ce13a0aaf7e0ca05a4210afc222624c9fa01a0ec272996505c46e433702515cb85bb543d4c3d8f48964b44d3353531f3921fc92514ff14", 0x6d}], 0x8, &(0x7f0000000f00)=[@rights={{0x20, 0x1, 0x1, [r5, r2, r6, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r14}}}, @rights={{0x34, 0x1, 0x1, [r15, 0xffffffffffffffff, r0, r0, r0, r2, r2, r16, r17]}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r21}}}, @cred={{0x1c, 0x1, 0x2, {r22, r23, r27}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r28, 0xffffffffffffffff, r29, r30, r31, 0xffffffffffffffff, r32, r33, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r34, r2, 0xffffffffffffffff, r0, r2, r35, r36, r0]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r37, r2, r38, r0, r39]}}], 0x170, 0x20000000}, {&(0x7f0000001080)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001100), 0x0, &(0x7f0000002000)=[@rights={{0x2c, 0x1, 0x1, [r40, r41, r42, r44, r45, r46, r47]}}, @cred={{0x1c, 0x1, 0x2, {r48, r50, r51}}}, @rights={{0x34, 0x1, 0x1, [r0, r52, r58, r59, r60, r61, 0xffffffffffffffff, r62, r2]}}, @cred={{0x1c, 0x1, 0x2, {r64, r65, r78}}}, @cred={{0x1c, 0x1, 0x2, {r80, r82, r86}}}, @cred={{0x1c, 0x1, 0x2, {r87, r89, r90}}}, @cred={{0x1c, 0x1, 0x2, {r91, r92, r93}}}, @cred={{0x1c, 0x1, 0x2, {r94, r96, r98}}}, @rights={{0x34, 0x1, 0x1, [r2, r99, r100, r101, r102, r0, r103, r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r104, r106, r110}}}], 0x180, 0x11}, {&(0x7f0000002180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002600)=[{&(0x7f0000002200)="91db1ac7a403d9fd4a6e5c92ad661562ed5be123d62831aac049e3d74756a40ed5dc67af817b2da46a05823481688c18927b925c83a64126dd1b7453de66e8b21676254e3fdc77ef206592c129515038ec966fc884de4b67a4a68a728ad7d06068c118b81ca3ece63e88e658ec33827a1b7ed12b5eee2471fb395d298fd3e097739eeb9eac76c828534716eae18da17f39654213b186d705419bf183e78727c54021676d0690405205b5", 0xaa}, {&(0x7f00000022c0)="6d52699b3bf4005d36fff88129b036a40260722a71909cb7cb3412082b6daef4b316ee8e5518d5c78796a40b5038ab2440fc7d2207c6424519f790996f99bb9ff57d5e369b368ec325734e6d508da96e798ed11b52b467145b6773e82049b149e8ecdccfa6cbd089e5cf39a42ddbcd4b3716e87b47493a8cea95bc3466018929786f8a8a3bc244bf9fb85b9f42226fa5e9d825a393e987ae542d4ec8fb1f5ecc757e8d75903d993de7b51ddbb7f0ece21c52fa8109b7d5cd03b512a388187872159329cb745848d5cffa77546b1ed950e6bc82c3f6bbf5a043d053b49fd348a285ed9ccb83ff4bbe820815da4250871a0a", 0xf1}, {&(0x7f00000023c0)="64db41a64ad795408cb8ebde702d8cf6c3e05930306cc24ab1a29ffa7336cb6ba45c4b8650a92cda758716fe520d913281511a67f986e31b6f6eb3a13384cd3aa60510e66d9ab6f999fa13ac18b2f23992de73c1463df661e4c2d50fff7d51ca370cabda11eca66d490db8deda3eb726688256326066fe6a140d", 0x7a}, {&(0x7f0000002440)="abf9a32ee6af3a60b1ed12edd3d1d5c431dc1fb5d6d746eb021235522f1f6d276d4e4e505eda7029da6ca55c9601a38dc54f9efa3cec9615c726cbe8c9c77ee0200f699057e29d17e5ff8c374a9d53f77e3f56622d8dfeffae765c875f60cf162468063223dac3", 0x67}, {&(0x7f00000024c0)="7dd69fa042dcff4efd55523f9be269ad6f28f3b2af8b380312f1d13f283572297b6d047ad86a431d10ea2d601ff1b17c3ccaff43c2afd1954e0f7cfdfc1c17ab4b300a8ed37ced52493dd0ba3aaac1a565379f17eadee9812f1d20fd903021da2b325a4f40", 0x65}, {&(0x7f0000002540)="337cb9b697be72db52ea1ce29bd3ddf314a100e503029843acbd3cb3436168198dbf386ae1d9096dcf1e80b1ba3f4c6929b6053a2166726e29d7c201a25f56394ebc04ae37d004bc3d4a99f711d24153e4e6f71cf13e7c9c82ce0dce15ea86a3ea85df21ffe47748bc3305047b325fe0a253615047fd89b046159912af6bbdefb53560e0c76c508a2d680495d56ae0fa87a09dba7894bbe3dc5d1189d83fa1aea4c977e37a7c5e13a7a045458a1a01a2e2e7dc0093c93132a88e87bf27", 0xbd}], 0x6, &(0x7f0000002800)=[@rights={{0x14, 0x1, 0x1, [r111]}}, @cred={{0x1c, 0x1, 0x2, {r112, r113, r118}}}, @rights={{0x24, 0x1, 0x1, [r2, r119, r120, 0xffffffffffffffff, r121]}}, @rights={{0x20, 0x1, 0x1, [r122, r123, r124, r125]}}, @cred={{0x1c, 0x1, 0x2, {r126, r128, r129}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r131, r135}}}, @cred={{0x1c, 0x1, 0x2, {r136, r138}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x110, 0x40050}, {&(0x7f0000002940)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002bc0)=[{&(0x7f00000029c0)="a038de970272b4b85002a392aa6f939be0a067e60c3d38cde08a42070f3f229994d279223c3840a79a78fbce9304b0f31260c0e7c5a5ac761ad5ea595692d5f30a", 0x41}, {&(0x7f0000002a40)="bff204c6c4c1234d39c763fbbd6f1a2aaa650e6602067b6b23592f450583a8e5231ce0ebb9491b2fd0331d9ce05530fc879e1ab9fe607cb42f494bce9f683b7a89ea519bcb29519d54550fa13c7ef4151856d4e801722403fa4fc85eff456383edb5678f3948cf12ecd594322eb4fa51a1fb76cc1426597b725f18b94f12c19314af3516c9dcd892ef1234ad0cdfe6cdf8fb53de7c2253362e6f8a67464fa770b9932bb45a133b5b820d0b2ea7abf844ce26a92f3eafd046ffafb3b83b88080e131e67a524e315fd63", 0xc9}, {&(0x7f0000002b40)="429009fc4d3ad531b5f9a74a5670fd9a7e412e84aaedcb4aec1358eae2dc4568dde6ca5433818102a4955001d44e01e16f4e731d94f332006facfeb585c7d270daabe53ae6a36767b1076643c8b274015ac5ed633f12db3eee592cee1d44ef1ff8d56afe0480e0d7f4bbd0", 0x6b}], 0x3, &(0x7f0000002d40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r139, r143}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r144, 0xee00}}}], 0x40, 0x400d000}], 0x4, 0x40084) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r3, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x4880}, 0x800) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x14, r3, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x30004000) 14:00:48 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, r9, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) [ 775.776565] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6929 comm=syz-executor.3 14:00:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, 0x0, 0x0, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 776.016222] sp1: Synchronizing with TNC [ 776.342240] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 776.350897] FAT-fs (loop4): Filesystem has been set read-only [ 776.356887] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="9fb0895c242efe679d5d26cfe63472ecc13fb31680fb36e8dd02cc52381baaac473ffa06b8d0ec047d74eadf922886b9f71e216fae3450c67d0c045fdb4f4a605e31f714152b708ce9cb0117ec1f53feb2982cb4bdd9afac808504b0bd1d2002f85f963c27531f14223da67338cf11912b5af795d7614e06ff34f481126d61c77efdbc2e501c302586ca802d73459fcafdcd1e0afd9a8805b7500a141f03ff32f9e1a6e7e2c6225d02833314115d04b13c42897f67bda94738656db43f158ad3c2afdd", @ANYRES32=r0, @ANYRES64=r1], 0x4}, 0x1, 0x0, 0x0, 0x20000811}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r11 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r10) keyctl$unlink(0x9, r11, r10) r12 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r11) keyctl$read(0xb, r12, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r12) r13 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r12) keyctl$instantiate_iov(0x14, r9, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r13) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r14 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r8, 0x0, r14, 0x0) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000440)="b5b3e1dba9f8abd1", 0x8}], 0x1, 0x3) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r15 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r15) r16 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r16, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r16, r16, &(0x7f00000001c0), 0x8080fffffffe) 14:00:49 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) [ 776.705411] sp2: Synchronizing with TNC 14:00:49 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x1) ioctl$TCSETXW(r0, 0x5435, 0x0) ioctl$TIOCSSERIAL(r0, 0x541e, &(0x7f00000000c0)={0xb4, 0x3, 0xffff4738, 0xc, 0x1b5, 0xffffffff, 0x7, 0x1, 0xe4e, 0x1, 0x0, 0x3, 0x3, 0x1f, &(0x7f0000000080)=""/19, 0x7fff, 0x3e53, 0x1}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = syz_open_pts(r1, 0x800) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000140)) 14:00:49 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, r9, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:49 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280), 0x0, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 777.180893] sp1: Synchronizing with TNC [ 777.255697] sp1: Synchronizing with TNC 14:00:50 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) finit_module(r1, &(0x7f0000000000)='-$cpuset\x00', 0x1) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 777.553670] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 777.562054] FAT-fs (loop4): Filesystem has been set read-only [ 777.568082] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) [ 777.682106] sp1: Synchronizing with TNC 14:00:50 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) 14:00:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) r7 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r7}, 0x0, &(0x7f0000000380), 0x0) add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f00000005c0)="717aa05a9629cb461b77de22343a43ff7074b2d4ec253c86da6eb3794e99055a2188ad1029c3d51ef474521d9294a07b30c80e947f057b854599d1b4b130020ccc955ae00376d8ce970b3f75b0f634702f3160dc379edf57feb1915cbd3bfb34d614a3b900cbe65daa61dac2d83e91976444dda9fd0c8ed8b2c894119a1b1bb09af02b0abf3bcf0a85f38ac3d068950c3ba10255b14fd1d11344d80fa7bd57a7d3b95841dfc1da42f2c439ece98e57b10fc82eaebee4918683620b8e06e8b8d8874446e3bf242bda8edd7a78885cdab7dde0431100243f6c51cc5534fd9e11a53d169db48d73", 0xe6, r7) r8 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r8}, 0x0, &(0x7f0000000380), 0x0) r9 = request_key(&(0x7f00000009c0)='id_legacy\x00', &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000700)='e\x05\x00\x00\x00\x00\x00\x00\x00\x00', r8) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x1}, 0x0, 0x0, r4) r10 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r10}, 0x0, &(0x7f0000000380), 0x0) add_key$user(&(0x7f00000007c0)='user\x00', &(0x7f0000000800)={'syz', 0x1}, &(0x7f0000000840)="8dd0c7", 0x3, r10) r11 = add_key$user(&(0x7f0000000880)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000a00)="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", 0x120, 0x0) keyctl$unlink(0x9, r11, r9) r12 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r12, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r12) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r12) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r13 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r13, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x3, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r14 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r14) r15 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r15, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r15, r15, &(0x7f00000001c0), 0x8080fffffffe) [ 777.796889] sp1: Synchronizing with TNC 14:00:50 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x8) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:00:50 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, r9, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:00:51 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 778.709721] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 778.718238] FAT-fs (loop4): Filesystem has been set read-only [ 778.724453] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:51 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, 0x0, 0x8080fffffffe) 14:00:51 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e25ff00000000000000f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x10000000, 0x7fff, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f00000005c0)='./bus\x00', 0x109543, 0x130) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:51 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) ioctl$TCSETXW(r0, 0x5435, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f00000004c0)={0x0, 0x0, 0x11, 0x2, 0x2d, &(0x7f00000000c0)="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"}) [ 778.958255] sp1: Synchronizing with TNC 14:00:51 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280), 0x0, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:51 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 779.236027] sp1: Synchronizing with TNC 14:00:52 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) [ 779.748947] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 779.757556] FAT-fs (loop4): Filesystem has been set read-only [ 779.763759] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:52 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, 0x0, 0x8080fffffffe) 14:00:52 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000080)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x4) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:00:52 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 780.329976] sp1: Synchronizing with TNC 14:00:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000030005000100070000009946a6170d3cc375bd6bf8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x68) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80000, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r12, &(0x7f0000001580), 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_QBUF(r12, 0xc058560f, &(0x7f00000005c0)={0x20000, 0x2, 0x4, 0x14e5fe7f9a762852, 0x3, {0x77359400}, {0x1, 0xc, 0x76, 0xe0, 0x7e, 0x0, "6c53cd51"}, 0x0, 0x2, @fd=r13}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r14, 0x407, 0x0) write(r14, &(0x7f0000000340), 0x41395527) r15 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r15, 0x80404521, &(0x7f0000001380)=""/4096) r16 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r16, 0x0, 0x0) ioctl$VIDIOC_QBUF(r15, 0xc058560f, &(0x7f0000001300)={0x7, 0x4, 0x4, 0x4000, 0x4, {}, {0x4, 0x0, 0x7, 0xff, 0x3, 0xb6, "6504d3a3"}, 0x80, 0x2, @fd=r11, 0x6, 0x0, 0xffffffffffffffff}) ioctl$RTC_VL_READ(r17, 0x80047013, 0x0) r18 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r18) r19 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) r20 = socket$inet_smc(0x2b, 0x1, 0x0) write$binfmt_aout(r20, &(0x7f0000001300)=ANY=[], 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r19, r19, &(0x7f00000001c0), 0x8080fffffffe) 14:00:53 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280), 0x0, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 781.077923] sp1: Synchronizing with TNC 14:00:53 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x9) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:00:53 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:53 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, 0x0, 0x8080fffffffe) 14:00:53 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:00:54 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073798e3e0000000005000100070000009946a675ffa2ecbd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e29442b1929bf1781fc0f05000000000100000000000000a8bf5ba68778e9595d2eb7dcac0500d0a9ddba844246c0b25e584200000000"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 781.873135] sp1: Synchronizing with TNC 14:00:54 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x18) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffff, 0x244000) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:00:54 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:54 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x0) 14:00:54 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{0x0}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 782.468414] sp1: Synchronizing with TNC 14:00:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000003c0)={0xf58ffff, 0x81, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x0, 0xff, [], @ptr=0xff}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x448040, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) [ 782.986190] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 782.994617] FAT-fs (loop4): Filesystem has been set read-only [ 783.001000] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:55 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$llc(r1, &(0x7f0000000080)={0x1a, 0x306, 0x2, 0x8, 0x8, 0x1f, @random="d0f178e2a579"}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 783.462713] sp1: Synchronizing with TNC 14:00:56 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:56 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x0) [ 783.588119] sp1: Synchronizing with TNC [ 783.896278] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 783.904959] FAT-fs (loop4): Filesystem has been set read-only [ 783.911211] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:56 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{0x0}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:56 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000b3c82821170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51b5419a0e2d442b1929bf1781fc0f09f65e7a7613e9e5fd3cc34f0b007cf75d2eb7dc874300d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:56 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000070050000f000000088030000f00000008803000088030000a0040000a0040000a0040000a0040000a00400000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac141400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001fe8000000000000000000000000000bb000000000000000000000000000000000000000000000000000000000000000069703665727370616e30000000000000636169663000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f000000000000000000000000000000000000000000000000000480052454449524543540000000000000000000000000000000000000000000000000000ac1414aa000049000000000000000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000006001a80100000000000000000000000000000000000000000000000028007463706d7373000000000000000000000000000000000000000000000000000000000000000090007372680000000000000000000000000000000000000000000000000000010000000000000000fe800000000000000000000000000000ff010000000000000000000000000001fe8000000000000000000000000000bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000048004d41535155455241444500000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0001801000000000000000000000000000000000000000000000000280069707636686561646572000000000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001000000007f000001000000000000000000000000fe8000000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000e67a50b499b7b8861856a73419de8cbc53ef87aacdcff3b7dad237afca7c1c8b4be9daa18f10a46c552769c1d5d23551f520ef6025ac1e29fef96e04ac3136"], 0x5d0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 784.342550] sp1: Synchronizing with TNC 14:00:57 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 784.473846] sp1: Synchronizing with TNC [ 784.634129] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 784.642812] FAT-fs (loop2): Filesystem has been set read-only [ 784.650703] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:57 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x0) [ 785.163608] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 785.172215] FAT-fs (loop4): Filesystem has been set read-only [ 785.178396] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:57 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000100)) syz_open_pts(r1, 0xc4201) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x42, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x36) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f00000000c0)) 14:00:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="270000002f060000008000000000000000020008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256130141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b027cf75d2eb7dcac0500d0a9ddba844246c0b25e5842051586f29da8d2426b9ffbef74a19fb21fe7bbbbc9d4e37c7b40885fb20931bfbd05b1d1682f64a3399a206a69f55230c810faafe08097e899b0500d429f"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:58 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 785.647356] sp1: Synchronizing with TNC [ 785.777497] sp1: Synchronizing with TNC 14:00:58 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{0x0}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 786.111236] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 786.119738] FAT-fs (loop2): Filesystem has been set read-only [ 786.125982] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:58 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xa) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x101, 0x80) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2, &(0x7f0000000100)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x7}}, {@common=@fscache='fscache'}, {@sq={'sq', 0x3d, 0x584d}}, {@timeout={'timeout', 0x3d, 0x101}}, {@sq={'sq', 0x3d, 0xffffffffffffff00}}, {@timeout={'timeout', 0x3d, 0x1}}, {@sq={'sq', 0x3d, 0x6}}], [{@subj_user={'subj_user', 0x3d, 'prockeyringcpuset'}}, {@subj_role={'subj_role'}}]}}) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:00:59 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:00:59 executing program 1: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,xino=on']) chdir(&(0x7f0000000280)='./bus/file0\x00') r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000180)=""/197, 0xc5) 14:00:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b12b1929bf178109f65e3a7613e9e5fd1cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e584200"/126], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 786.808340] overlayfs: unrecognized mount option "xino=on" or missing value 14:00:59 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000300)=""/4096) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000100)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$IOC_PR_RELEASE(r4, 0x401070ca, &(0x7f0000000140)={0x2, 0x7fff}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000080)) dup(r5) [ 786.972775] overlayfs: unrecognized mount option "xino=on" or missing value [ 787.005748] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 787.014149] FAT-fs (loop4): Filesystem has been set read-only [ 787.021492] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:00:59 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x2000000000000000, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) [ 787.447459] sp1: Synchronizing with TNC 14:01:00 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 787.677798] SNAT: multiple ranges no longer supported 14:01:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @remote, 0xc01}, {0xa, 0x4e21, 0x80, @mcast2, 0x7}, 0xffffffffffffffff, 0xa8}}, 0x48) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, 0x0) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) 14:01:00 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9dd45ced299c0b25e580000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 788.002026] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 788.010349] FAT-fs (loop4): Filesystem has been set read-only [ 788.016331] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:00 executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) read$FUSE(r1, &(0x7f0000000080), 0x1000) timerfd_create(0x9, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) open$dir(0x0, 0x0, 0x0) open(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) r2 = open$dir(0x0, 0x0, 0x0) mkdirat(r2, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x7fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 14:01:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000000)={0x7, @local}) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 788.249313] sp1: Synchronizing with TNC [ 788.314533] audit: type=1400 audit(1583676060.826:86): avc: denied { wake_alarm } for pid=7608 comm="syz-executor.1" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 14:01:01 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:01 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r5}, 0x0, &(0x7f0000000380), 0x0) request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)='/\x00', r5) r6 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r6}, 0x0, &(0x7f0000000380), 0x0) r7 = add_key$keyring(&(0x7f0000000600)='keyring\x00', 0x0, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$unlink(0x9, r9, r8) r10 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r9) keyctl$read(0xb, r10, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r10) r11 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r10) keyctl$instantiate_iov(0x14, r7, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r11) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r12 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r12, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r13 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r13) r14 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r14, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r14, r14, &(0x7f00000001c0), 0x8080fffffffe) 14:01:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x881, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000a00)="080d95055e0be8478071") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r1, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_IP_TARGET={0x4}, @IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x40}}, 0x0) 14:01:01 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x0, 0x1f, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0xa10907, 0x7ff, [], @p_u32=&(0x7f0000000000)=0xfff}}) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x31) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x100000001}, 0x20, 0x2000000007826}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xffff, 0x103400) r5 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xa5, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r6, &(0x7f00000017c0), 0x3da, 0x0) r7 = creat(&(0x7f0000000480)='./file0\x00', 0xc0) r8 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r9 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r9, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102, 0x8000003}, 0x20) connect$inet6(r9, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r9, r10, &(0x7f0000000240)=0x202, 0x4000000000dc) r11 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r10, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r11, @ANYBLOB="050c278000000000880054127300"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r8, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="40150000", @ANYRES16=r11, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x8080}, 0x4) sendmsg$NBD_CMD_CONNECT(r7, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001540)={0x68, r11, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffffffff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x68}, 0x1, 0x0, 0x0, 0x24000}, 0x41) r12 = dup(r3) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000280)={0xf000000, 0x8, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0xa00902, 0x2, [], @value=0x7fffffff}}) r14 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r14, &(0x7f00000017c0), 0x3da, 0x0) socketpair(0x6, 0x4, 0x2, &(0x7f00000002c0)={0xffffffffffffffff}) r16 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x8c, r11, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r12}, {0x8, 0x1, r13}, {0x8, 0x1, r5}, {0x8, 0x1, r14}, {0x8}]}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r5}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x80) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r11, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x800}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004081}, 0x80) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x1f, 0x8}, 0xc) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:01:01 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:02 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 789.853399] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 789.922120] audit: type=1400 audit(1583676062.426:87): avc: denied { map } for pid=7668 comm="syz-executor.3" path="socket:[111021]" dev="sockfs" ino=111021 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 14:01:02 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x54, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) [ 790.561122] sp1: Synchronizing with TNC 14:01:03 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:03 executing program 1: getpid() timer_create(0x0, &(0x7f00009cefa8)={0x0, 0x12, 0x4}, &(0x7f0000044000)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x6, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000180)) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r1 = syz_open_dev$cec(0x0, 0x3, 0x2) r2 = dup3(r1, r0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0xc0506107, &(0x7f0000000000)) sendmsg$rds(0xffffffffffffffff, 0x0, 0x11) r3 = inotify_init() r4 = semget$private(0x0, 0x7, 0x0) semctl$GETALL(r4, 0x0, 0xd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000100)={{0x2, r5, 0xffffffffffffffff, 0xee01, 0x0, 0x100, 0x7}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x80}) inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) r6 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x80000000) shmdt(0x0) inotify_rm_watch(r3, r6) getgid() [ 790.632323] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 790.715244] Bearer rejected, not supported in standalone mode [ 790.822509] Bearer rejected, not supported in standalone mode 14:01:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)=""/41, 0x29}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) recvfrom$inet(r1, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/212, 0xd4}], 0x1) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r3, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) write(r5, &(0x7f0000003480)="dc11e430022fdc779f9b4d24bdd8fd586c6875b53dfa7d488f7f576b76d6631752d1dc6d62858c480074266f6c7ce209a81eeda7ced9e2a609d67edbdb33807baa39862cefecd836f1c56da1366b394b2b34d223344b07c7dcbf0ffacf3e9b52a5c868685a4657dbc694485e7c6bf6bfd719a78ab7475459ab4d48f65f700df04272ef99bc5c0d17ab6d9b158510ea84e436b3dea76caf9cffb0b6ff741e7df23989486491fe6ae2a187449f3e2007d939893806c20f2d24cbc9d1c54e9cba6110f23e2d6827889b4e827cf48558ac6d77d46c4c94a0e201249eb462258e9950d571044ee6", 0xff8b) shutdown(r4, 0x0) shutdown(r1, 0x0) 14:01:03 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 791.183557] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 791.191984] FAT-fs (loop4): Filesystem has been set read-only [ 791.198052] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000300)=""/4096) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x17) socket$netlink(0x10, 0x3, 0x5) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000000)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r6, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x14, r8, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r6, &(0x7f0000001300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x3c, r8, 0x10, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb9c}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x27}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008080}, 0xc040) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, 0x0) write$vhci(r4, &(0x7f0000000200)=@HCI_ACLDATA_PKT={0x2, "3e2470e07c054498a520be98f4ee032f04194f84ca8f45b7b98c3308c282e80c9dbad79fb751e8b8ebb129b5232806634c6aca7b1097b5d70f909f716652f876aa2da66c445cc05f2a4c3dfede792bffaa3785332a6f9912b5884f6b19655e19e7c352e71b3944d0c3fb6dc6923eff4a105a6ffd47d504c2494bf332aa0d33f84918d7226b156a31a72e7266a78636104d5bd42cb4fb28d85cac9e272fd09fa5b89377565ed8f7a2d790296bba35dd6a64bfee889d9bdcb315d8be737ff4f3e18b3cc578e9ee5ca1abdffe1482980d7ca614516075ef0446"}, 0xd9) ioctl$TCSETXW(r1, 0x5435, 0x0) 14:01:03 executing program 1: getpid() timer_create(0x0, &(0x7f00009cefa8)={0x0, 0x12, 0x4}, &(0x7f0000044000)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x6, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000180)) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r1 = syz_open_dev$cec(0x0, 0x3, 0x2) r2 = dup3(r1, r0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0xc0506107, &(0x7f0000000000)) sendmsg$rds(0xffffffffffffffff, 0x0, 0x11) r3 = inotify_init() r4 = semget$private(0x0, 0x7, 0x0) semctl$GETALL(r4, 0x0, 0xd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000100)={{0x2, r5, 0xffffffffffffffff, 0xee01, 0x0, 0x100, 0x7}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x80}) inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) r6 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x80000000) shmdt(0x0) inotify_rm_watch(r3, r6) getgid() [ 791.355121] sp1: Synchronizing with TNC 14:01:03 executing program 1: getpid() timer_create(0x0, &(0x7f00009cefa8)={0x0, 0x12, 0x4}, &(0x7f0000044000)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x6, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000180)) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r1 = syz_open_dev$cec(0x0, 0x3, 0x2) r2 = dup3(r1, r0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0xc0506107, &(0x7f0000000000)) sendmsg$rds(0xffffffffffffffff, 0x0, 0x11) r3 = inotify_init() r4 = semget$private(0x0, 0x7, 0x0) semctl$GETALL(r4, 0x0, 0xd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000100)={{0x2, r5, 0xffffffffffffffff, 0xee01, 0x0, 0x100, 0x7}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x80}) inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) r6 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x80000000) shmdt(0x0) inotify_rm_watch(r3, r6) getgid() 14:01:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)=""/41, 0x29}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) recvfrom$inet(r1, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/212, 0xd4}], 0x1) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r3, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) write(r5, &(0x7f0000003480)="dc11e430022fdc779f9b4d24bdd8fd586c6875b53dfa7d488f7f576b76d6631752d1dc6d62858c480074266f6c7ce209a81eeda7ced9e2a609d67edbdb33807baa39862cefecd836f1c56da1366b394b2b34d223344b07c7dcbf0ffacf3e9b52a5c868685a4657dbc694485e7c6bf6bfd719a78ab7475459ab4d48f65f700df04272ef99bc5c0d17ab6d9b158510ea84e436b3dea76caf9cffb0b6ff741e7df23989486491fe6ae2a187449f3e2007d939893806c20f2d24cbc9d1c54e9cba6110f23e2d6827889b4e827cf48558ac6d77d46c4c94a0e201249eb462258e9950d571044ee6", 0xff8b) shutdown(r4, 0x0) shutdown(r1, 0x0) 14:01:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001340)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x712, 0x0) flock(r2, 0x40000003) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x9cf4, 0x0, 0x0, 0x800e0079f) shutdown(r1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x712, 0x0) shutdown(r3, 0x0) 14:01:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x9}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000300)=""/4096) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000040)={{0x3, 0x2, 0x3, 0x3}, 0x0, 0x4, 0x4000000000000004}) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1000, 0x0) r5 = openat(0xffffffffffffffff, 0x0, 0x0, 0x40) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f00000001c0)=0x44) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(r5, 0x4008642a, &(0x7f0000000100)={r6, 0x18}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000200)={r6, 0x2}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:04 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:04 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x4000, &(0x7f0000000180)='v'}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000140)=[@acquire={0x40046304}], 0x0, 0x8126000, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x20, 0x0, &(0x7f0000000140)=[@request_death, @clear_death], 0x0, 0x8126000, 0x0}) 14:01:04 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88ed", 0x5}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:04 executing program 2: getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x101000}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x10000, 0x285e11}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 792.217031] audit: type=1400 audit(1583676064.726:88): avc: denied { set_context_mgr } for pid=7797 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 14:01:04 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f00000000c0)={0x1a000, 0x1000, 0x5, 0x28, 0x6}) ioctl$TCFLSH(r1, 0x540b, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:01:04 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) [ 792.403163] sp1: Synchronizing with TNC 14:01:04 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xb, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x4) [ 792.487086] sp1: Synchronizing with TNC 14:01:05 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xb, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x4) 14:01:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket$inet_udp(0x2, 0x2, 0x0) readv(r1, &(0x7f0000002180)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/81, 0x51}, {&(0x7f00000010c0)=""/107, 0x6b}, {&(0x7f0000001140)=""/64, 0x40}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x5) 14:01:05 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="62020207e0"], 0x1) r0 = socket(0x2, 0x2, 0x0) r1 = socket(0x2, 0x2, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x100000000000000a, &(0x7f0000000040)='\x00', 0x1) dup2(r2, r0) dup2(r0, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) 14:01:05 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:05 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x100000000000000a, &(0x7f0000000040)='\x00', 0x1) 14:01:05 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001500)=ANY=[@ANYBLOB="00009c2100000000000000", @ANYRES16=r2, @ANYBLOB="1700000000fe0000000000d34f176b0ec0719d56b7868a030dc7f4e84a0b6ef61a692c8d40db72f070d7316bc8eb248783b392badbb63cf72740adb57cfbdc9cd15ff26fd85467876034e0ec103e55c51e6af73bc512f4ce695f1d55f8ddd7749e46b26009b77245f9bf7ecfe679993cb540cfec94db5b6cabb84257cc7fe5224eccf90800000000000000eb4a7056c4f7743d0b658ff2e86135e8e22e53483f54bfabe09c9c8374ea2258d9321c658bad64461f39df218e15c104b17c021b5e4bde7938d8ad4cfe5824c666b7e78e8b558c59416c00"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x170, r2, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x824}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x512}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7181e9f4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x64}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xde}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff9e03}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x24040041}, 0x20000802) 14:01:05 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x0, 0xb, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x4) [ 793.124802] sp1: Synchronizing with TNC 14:01:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) syz_emit_ethernet(0xdc, &(0x7f0000000280)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0xfffffffffffffe9d, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@timestamp={0x44, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}, @timestamp={0x44, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"5db3875750895dbdfa2961e3b6b1113379956a7003db1a2b05533d3697ca3e94362b80d7772a68c95529663785264e545decb8f52e8d759a98f97a07a579313a0912f10339e478a3b0c4699214ea111f3f1dd653bfd7207af77b708ead575540ae890e83e8aee69f412f4113f9eb5d1fb3feadfe2296c625c862cbddd414692fc8577f6806714b02579a5af7b6e2ac4cd12ce98528545d78ef25ec4abd3af784740d4f97cd81"}}}}}}, 0x0) 14:01:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000003c0)={0x0, 0x1, 0x0, [{0x0, 0x0, 0x3}]}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000080)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb76ea7211439a321f589f32be513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b143521435cb49840b0f61274420a5d97c3648665ff781c9e5dc44575"], 0x5}}, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:06 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88ed", 0x5}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:06 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 14:01:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x40a402, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000001c0)=""/85) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x11d003, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x7fff, 0x5, 0x3}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r4, 0xc0045002, &(0x7f0000000080)=0x10001) socket$pppoe(0x18, 0x1, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r4, 0xc004500a, &(0x7f0000000100)) sendfile(r4, r2, 0x0, 0x1c01) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r6, r5) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x1000000, 0x0}) 14:01:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x7ff}, 0x1c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x24008806, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 14:01:06 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 793.942020] sp1: Synchronizing with TNC 14:01:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x8}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x14, 0x2, [@TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x5}, @TCA_BPF_FD={0x8}]}}]}, 0x40}}, 0x0) 14:01:06 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0xd0200, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0x1, 0x7ff, 0x7ff, 0xfffe, 0x18, "d79c9e5045a5f8d1"}) 14:01:06 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0207000702000000002000000000fdffc4d8d8ea55bda1c5ba0ee78af60ca10007b0da58bd2b0800000048f25d1b9eb8bf1974e9cf6ccf"], 0x37}}, 0xc8c4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 14:01:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) getdents(r2, &(0x7f0000000180)=""/197, 0xc5) [ 794.483820] sp1: Synchronizing with TNC 14:01:07 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000001400)="9635ab0f", 0x4}, {&(0x7f0000000140)=']', 0x1}, {&(0x7f0000000200)='\r', 0x1}], 0x3) 14:01:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000040)) [ 794.799047] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 794.807428] FAT-fs (loop4): Filesystem has been set read-only [ 794.813487] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) [ 794.863469] sp1: Synchronizing with TNC 14:01:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b892ce00", @ANYRES16=r2, @ANYBLOB="08002bbd7000fddbdf25070000006000038005000800080000000600040004000000050008000500000008000500e00000020600040017000000140006000000000000000000000000000000000006000400090000000600040080000000050008000400000008000300020000000800060001000000080005000001000008000400050000002c000280080003000300000006000e004e2100000800070002000000080008000004000008000400540f0000"], 0xb8}, 0x1, 0x0, 0x0, 0x8000000}, 0x2000000) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x18, 0x0, 0x0}) 14:01:07 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88ed", 0x5}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:07 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000014007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="240000002e000102000000000000000700000000", @ANYRES32=r5, @ANYBLOB="00000000000000000800f1ff"], 0x24}}, 0x4) 14:01:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), 0xf0) 14:01:07 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x10) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@local, @loopback}, &(0x7f0000000080)=0x8) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:01:07 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:07 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) bind$inet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r0 = socket$inet6(0xa, 0x8004808000080003, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000004000c8004001a80008e2a7876eb42aa52c01066b564ed3a28b3ecf281c200c39e3a722aead01b39bc5b2cfe913bd5980973fba56bf8f83052d502d2a6a355ef8df5c96e3af351b4c5f63bfa2a7818734f332ecb23f97fc3639d172151049027be38448b59b4c96868281ec264a8a651d406cb6ab05cd71728ab121c71c692640dddf13818405e79144d98dbeda19613cdb874abc9b929226060008caa0b5e6920ad54cf38b66e12d06f15e7c1049bb61778c70c2a3ced"], 0x28}}, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0, 0x0, 0x0) 14:01:07 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) bind$inet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r0 = socket$inet6(0xa, 0x8004808000080003, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000004000c8004001a80008e2a7876eb42aa52c01066b564ed3a28b3ecf281c200c39e3a722aead01b39bc5b2cfe913bd5980973fba56bf8f83052d502d2a6a355ef8df5c96e3af351b4c5f63bfa2a7818734f332ecb23f97fc3639d172151049027be38448b59b4c96868281ec264a8a651d406cb6ab05cd71728ab121c71c692640dddf13818405e79144d98dbeda19613cdb874abc9b929226060008caa0b5e6920ad54cf38b66e12d06f15e7c1049bb61778c70c2a3ced"], 0x28}}, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0, 0x0, 0x0) 14:01:08 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x81, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") syz_genetlink_get_family_id$devlink(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 14:01:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x109000, 0x130) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000080)={0x1, 0x5431, 0x4, 0x100}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'gretap0\x00', 0x2}, 0x18) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:08 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r0, 0x4112, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000004c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) r4 = dup3(r2, r3, 0x80000) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000000c0)={"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"}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8002, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f0000000080)={0x1, 0x1, 0x892, 0x2, 0x3}) ioctl$TCSETXW(r2, 0x5435, 0x0) 14:01:08 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:08 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf28", 0x7}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1, 0x80) [ 796.311921] sp1: Synchronizing with TNC [ 796.647987] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 796.656583] FAT-fs (loop4): Filesystem has been set read-only [ 796.662672] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) [ 797.057414] sp1: Synchronizing with TNC 14:01:10 executing program 1: 14:01:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4={[], [], @multicast1}, 0x13f}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:01:10 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000300)=""/4096) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x9, 0x1f, 0x8, 0x3, 0x0, 0x90, 0x5200, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x800, 0xffffffffffffffc0}, 0x1080, 0x2450, 0xffffffff, 0x1, 0x8, 0x43, 0x101}, 0x0, 0x7, r1, 0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x19, 0x18, 0x0, 0x0}) 14:01:10 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:10 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)) 14:01:10 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf28", 0x7}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:10 executing program 1: 14:01:10 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000080)={0x1, 0x0, {0x4, 0xffffffff, 0x2013, 0x4, 0xa, 0x7, 0x0, 0x2}}) [ 797.645404] sp1: Synchronizing with TNC 14:01:10 executing program 2: [ 797.695152] sp1: Synchronizing with TNC 14:01:10 executing program 2: 14:01:10 executing program 1: 14:01:10 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x100000000) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000140)=0x4) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000200)={0x9, 0x2, 0x100, 0x300c4961, 0x3, "dec0bb256c22fb812a9c376c9f8286b7a6004a"}) sched_yield() ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000080)={0x0, @reserved}) ioctl$TCSETXW(r0, 0x5435, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f00000001c0)=0x3) 14:01:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000d8000000d8000000090000000c00000009000006040000001000000080000000050000000c0000000400000001000000df00000004000000090000000a000000200000000400000007000000010000000700000004000000040000054000000001000000040000009640000001000000ff00000028ae00000c0000000500000002000000100000000b000000c2b70000020000000000000b000000000900000000000002030000000e000000030000040100000009000000030000003c0b000007000000010000003f0000000a00000002000000ff030000005f00005f615f0000"], &(0x7f0000000240)=""/77, 0xf9, 0x4d}, 0x20) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) ftruncate(r3, 0xa56) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000100)) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0x8d, 0x5, 0xd2, 0x144, 0x5, "f3b966699f6f4bc2bcd82b230f277cb21556d8"}) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000080)=0x8) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0x9c0, 0x916c]) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:10 executing program 1: 14:01:10 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf28", 0x7}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:10 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:11 executing program 2: [ 798.518944] sp1: Synchronizing with TNC 14:01:11 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:11 executing program 1: 14:01:11 executing program 2: 14:01:11 executing program 1: 14:01:11 executing program 2: 14:01:11 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$TIOCEXCL(r2, 0x540c) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000300)=""/4096) getdents64(r3, &(0x7f0000000180)=""/82, 0x52) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) fcntl$getownex(r4, 0x10, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000040)={0x3, 0x3, 0x0, 'queue1\x00'}) 14:01:11 executing program 1: 14:01:11 executing program 2: 14:01:11 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x8, 0x8, 0x80000000, 0x1000, 0x1, "f0ef9f9a09d2b9700aa8a08f68dbfd750e585a", 0x7, 0x7}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x200, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000000c0)={0x2, 0x0, 0xfc, 0x5}) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 799.529890] sp1: Synchronizing with TNC [ 799.602966] sp1: Synchronizing with TNC 14:01:12 executing program 2: 14:01:12 executing program 1: 14:01:12 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:12 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:01:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf2895", 0x8}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:12 executing program 2: 14:01:12 executing program 1: [ 799.919845] sp1: Synchronizing with TNC 14:01:12 executing program 3: 14:01:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) sysfs$1(0x1, &(0x7f00000000c0)='posix_acl_access#\x00') r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) dup2(r1, r2) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:12 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008001) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) 14:01:12 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x6002, 0x0) 14:01:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xad}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/65, 0x41}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000200)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x3d, 0x0, &(0x7f0000000340)="d79652b207f9732d44959428b7986796da451fa77b6476810f8e271c8328435202cff2de5cffc9b3e366db1a117ced8e414b891bcdf932615b97917648"}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:01:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xae86, 0x7fff, 0x200, 0x6, 0x2}}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 14:01:13 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:13 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x8, 0x19, 0x0, 0x0, 0x0}) 14:01:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf2895", 0x8}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:13 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 14:01:13 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x8, 0xfffffffd, 0x10001, 0xa8, 0x51, "ffbfc9b344e38dfb2967c2f2ce07b5cbe360e3", 0x80000000, 0x45ac9a02}) 14:01:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:13 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000040)={0xfa, "14650c67929683d9b74481e43bd21919b9772d197abb8c4b4e8f4aa757ef79af410ed49c75f4fbd5e26da6a157593aa18cf5cb5e1d14a2a1e211656bf197724f35fca9aee34c052d402bd69b9f67ef965d56b131c3832e738a17bde5a0e4f4c5bdee505e650ef22aaaa3ea6857990d8f4ec8fcab7d631f28e48c0aca2195742cc75e8a997a3582debf3131eb0e80a2287b7b6476c51129ffb12d0da16636df07210f979d0c06ef154f0a4c865a88e7534552e46caebba620a34e18292ebde6f461796e828268cb269a82ba1ffa78b7de4ee5c0420b83235e5c72ddcf0ef495aa43bc4be59c2414ca62b00fc3d48d43578b4606fbaa7486a3c6089eefe4e4f3d6de3230c93824126e39c3f7767a14f6fe680fd2d95e0c93f354525c9df7fdcc3670697c11cb71c30ec72fff3f4fa76eb5befc575839d889a16a14e3e6c83f4fbf14140f03c3fffd8d0d759f480c5f0260d80781dc3dfb07a0292d42f58dd3e77dae5bc90e2ebe9b40aab585f5c2d7d60bbfab1da435867f0529039ca4e6fe50f68aca844e62c713fbefcbb09e42aba697dce6513e0e8588e1cdfcf8da8c37fbc245b0e28e68db442d98f40a0cef70bb1a44aebb1820fa62184ffc40b239f55270e836db0858bd5d0373ae087e16e9ef10a699571c3018accac540d71ff58c26fd6f12050af3737ffad4961b288f41e2f645171dea7b12b49f7584752fa7e1eccc"}) [ 801.410974] kvm_hv_set_msr: 23 callbacks suppressed [ 801.410983] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000000a data 0xfffffffc [ 801.526573] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000016 data 0xfffffffc [ 801.592203] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000001c data 0xfffffffc [ 801.761253] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000022 data 0xfffffffc [ 801.841082] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000028 data 0xfffffffc [ 801.868661] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000002e data 0xfffffffc [ 801.892179] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000034 data 0xfffffffc [ 801.915553] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000003a data 0xfffffffc [ 801.939800] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000040 data 0xfffffffc [ 801.966174] kvm [8354]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000046 data 0xfffffffc 14:01:14 executing program 5: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0xfffffffc, 0x0, 0x0}) 14:01:14 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x0, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) msgsnd(0x0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/60}, 0x44, 0x0, 0x0) 14:01:16 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x19, 0x0, 0x400001e1, 0x0}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) 14:01:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf2895", 0x8}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:16 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 803.683312] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 803.718898] kvm [8404]: vcpu0, guest rIP: 0x48 disabled perfctr wrmsr: 0xc2 data 0x1003300c8 [ 803.726870] kvm [8394]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 14:01:16 executing program 3: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getpid() r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:16 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r4, 0x8, 0x109, 0x2}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={r5, 0x7, 0x10}, 0xc) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r9, 0x5457, &(0x7f0000000080)) ioctl$VIDIOC_DQBUF(r8, 0xc0585611, &(0x7f0000000200)={0x5, 0x4, 0x4, 0x100, 0x6, {0x0, 0x7530}, {0x5, 0x8, 0x5, 0x7, 0x4, 0x40, "8d075ef0"}, 0xfffffe00, 0x1, @fd=r7, 0x400, 0x0, r9}) sendmmsg$alg(r10, &(0x7f0000008600)=[{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000002c0)="e053a4924a86470d3baee12fc1b0dc2f7a6f9db8e2d5630e40c8b64a2501ee4fdf82f694cde0c634128215fd00829988b3eeb632f15eb6ad92110283139b766248a5986b25017e5b3bb822452972fa89720da31394545075325913e3e163a237fb33adb970dec18b7fee520563d6f11e28aff84a53e088ec0e7ac18fc6d294801a5564b25b5c48e2565208", 0x8b}, {&(0x7f0000000380)="4622d2c4975a4c559d3e50e3031fd4c8bdb2cf723d316399c6abee6417f67a6c37f428f6d4f4854047b297417941a36afbee9e788c8233ce0ea9883758e4ca0a7100e57ff55f6d4ae7c8119cb9aa5b941563dd0591a808cf761144e6a39992033efbb0785a6aed16ba787e03d9d4ac984047b09171fe1ed0b9fbd4f90fc0d19e4827d5", 0x83}, {&(0x7f0000000440)="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", 0xfc}, {&(0x7f0000000540)="76079744d3dd877372acad635e966bb5dc16a158d95b", 0x16}, {&(0x7f0000000580)="847167f202198ecdba41098f33bc12d2980f73c7ebd82bfe5550ce4a1c3fcc60761a4ea1b1e38aea30228dcab975981b7a53f635f5a491ff2f69730da354054eda7ea8ff6b7170b4c26693cf74f3c568360bf7288317d32ccfae0881224b8329ed", 0x61}, {&(0x7f0000000600)="50566b30a86219a7a5d95cb13187f521747a33b149504643e9a0c382378befc9ca2b874af3803eb92d530fda6f7e411abe37ac80", 0x34}, {&(0x7f0000000640)="6eef31432acfbb0742b493e21f6cc9bb0388d735eaefa554b2644dba9c414f999b5fb831c0c63a32fef9e5c33a21955d2f8f6ac1f0e7d88bec376f60caf24cfb91b7bd48ffd118a50568c5f7ef3ce8652c5b2ec2c796d03d50f8ddef4a441640cc0a356c3d7c1dad48de8bca2227fd6a6a7615205ff599d445f893c1969d31534d76d756a5d5d60b24404543191510c84c4df51478f8b762fe3322e1a9bae91e61c3c83569b9c37bcbf857a0b9e7ef3b47cf9c8d85dafad3016de525f771c4f82838932ac2cf3cdd6692", 0xca}], 0x7, &(0x7f00000007c0)=[@assoc={0x18, 0x117, 0x4, 0x7606}, @assoc={0x18, 0x117, 0x4, 0x7fffffff}, @iv={0xa8, 0x117, 0x2, 0x92, "f33b8cc0e81c8629f5212a2455181a45b81975ca64fcbc87c3819c198acf812c7a3470892b82b87f62591d269454f06400f4189c694e501ca77cf3de8d8a805d92dd276e477dc974367af0948c8749801718b97dc2261cf7bb73b083f303a9689d5b88779dfa066215e048116509e04edace7eb512e8ec1d409c335138bf30f77cd27f4cd39a2dde255839c1f6018923f04c"}, @op={0x18}], 0xf0, 0x40000}, {0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000008c0)="92333b38125f05745fec47e7", 0xc}, {&(0x7f0000000900)="9ffa3b3756b248fc27aa41e5cda92a7ecc7122e9c7a937b36b4a98e941febcfce9373be1171d211136ae33b75a40c997bdd3fd11f642edd51afcb3e0397a532ce44a66c3d24204c83fbe58d61a85bc7759d0cd03eb51b258d6bf04654a84a64c68d3a73b3c12bb1e99b32a54be8b28e90c1fc4a4e3a5bcf235f150dcf06350a06efad8c03779e002792d49f6425c72874b78428929fa846cfde82487f0a327026c39d9a0cf72ebe9b1ada2ddddcd8c6ab8db3cb54e15e6c2e7fafb7773416296f16a62e61b3c21204d8cc8932ad34e3d0b11a984cdef2fd1d47f53bd017b34805408693c78efe0427213d602469b2483a97e123e9b81a74d", 0xf8}, {&(0x7f0000000a00)="79589e3539", 0x5}, {&(0x7f0000000a40)="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", 0x1000}], 0x4, &(0x7f0000001a80)=[@assoc={0x18, 0x117, 0x4, 0x4}, @iv={0xa8, 0x117, 0x2, 0x94, "2fee7f891fc5720189a3ad6de852c49eb1a084a6f20370549cd4db770bf5624fa07a966c29e3e9878beec70efa26b3f7dae5e5e1dee5936ce7d54c286532a62ab9017feda63ebd1e14e4b2a2a8ce5e25529064ed335f2f5c34e9de562099f9fb0726466995497670a118989c70a58e25d61cc75b44595ebdff50e9a79b2ded467bc89d21a9dde99cea76fbeae9759183e863930b"}], 0xc0}, {0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001b40)="a639285061cef6e889a6a1ac53574189c6f64388060e791784a40a00e82f8c51f9cd95978c1a34c2dd83773c1c10fc2629ce10c545025f4cf540d9dfc8bc76e0955290e44876407d66d39e5ea25aa1a242c745f1ba21043c637117aebb108936892b077f6b3a9400382f250b00b23576c0370b326e14ca901daf210a86452ccbecb9e8ac1bedd2483d5f80632077de15ead64b7f79d243fe4a0091d6fc", 0x9d}, {&(0x7f0000001c00)="feeb7287d741e4ca12e06197eaff6f7c0beab134ff0d5c35ec8028d961aca23e3132c543d6a65123018d95e0e043b6e5deae8fdcb3bd19a6c7386981ee25a12a5ae2b7ba9c55ca971c947b488dc6fd2de13738547fe22eb6093436ecbdb4a19b72e97e178bad8cd8a59d70038a63ca5b447fcbea277f83c1aab1e03452d6e0ec0902985ff2299a7c81230366c7679c3160f80cb10b9d233e7a49db2cfaed42d8", 0xa0}, {&(0x7f0000001cc0)="4a8c72748e80333b1a5000cdbe84d6536c0ba6ba70ad6e090b1264f79bc614315c45f6dfb81c711ed758d3d5", 0x2c}, {&(0x7f0000001d00)="b91a79b3d16f3066dee2bba7448cdadcbfed62654f6bc9d7f61a2f662dd7133a482099bbd5da1a640dd097ac3684b96a87ee131c0fd028c029e13c0c46cbef5f2916167cdc86d06c7a3f984a34f924087fe0237e967cfa5e81b17d0e198b91f6d077e35a4d432772e232b5bbbac2da41fe2f574929438ab0c0f46fb6349c500ed9929f8236a97cb001", 0x89}, {&(0x7f0000001dc0)="ef625f8762f255fecfd5f5c6534ad06f564969d10fd0a8ef9ac037d4faa5ec69b9ebf43d7bd2116de9180b2022824deb72519198276f7cb984dfd5dfe102b6b10f385e4e3f8779a9bfcd1c64e5c6a2f5d72b4d60f815ae1f7eaaa51b05f4d0009d74f8ac27b43b028e43174e1b5d6353eebe91099d376abf0d635c26710706e425ce4749214635ad75aef3a7a2faf2b8cd6e5aeba205efc2b145aba3b7bed6a547c32aa41f9197da383baeb8c3b02b394f784bff5c410f18597242406ee5f2c642cff7f7de9551ab7d15b6f5787bf2cec1f5302f3aeef5ee0f", 0xd9}, {&(0x7f0000001ec0)="6908f7a9d9064579a3ec65b5a38aa2a8d602a993d1a49825c077019b", 0x1c}, {&(0x7f0000001f00)="1b87bc63c8563387c396b1d3844c488ade47eb638d55fa4d11bb61ffb233bb551da0b4f773ae887c2f14e577f9139c4eccb5dae8a34e979a841a2e8f2b13b05174a210", 0x43}, {&(0x7f0000001f80)="cd334953c4c44751a17351276ec9b3def06f96a2be", 0x15}], 0x8, &(0x7f0000002040)=[@assoc={0x18, 0x117, 0x4, 0x7}, @iv={0xa8, 0x117, 0x2, 0x90, "4a15cb7784c23bf82347161f8f579b5ce2f3c3974e34bec339f4f8826e33433ff8c02a698f61053b8e875f8d396fa31686c753fa2de459ebf0f8ced39de834909ce487362e7764513278e7bd07bea464cb9a7d112a37514ae5aab7c4d51422d5168d7d5ba137efd075e36117c7b9c740f659b0125748221aad7b94d83322365a9bd2f01d9d534559d88c2236996e2481"}, @iv={0xa8, 0x117, 0x2, 0x8e, "9a3da73a90bdeeb0786dafdf178a0f1f13d494106c70346cfdc3c9aa944592b1d9ac2daf0a1cb5051de03597867903ccf2dee0962e2e1ad7ce1dc210fe407e4da7f740c43c3b0e30fe6a96a36528d998b37277b96e9e61116911c6dd8b65db0ddbf346fbf1ce5174b54648b8163e77d189f8bc397d558f559d2113d08dfa1b249c1f745dfc2ff842bb0cf8108751"}, @iv={0xb0, 0x117, 0x2, 0x96, "a9bb1dd7ce59177ad059a595d191e89ae649e6e4116e696244eb7edb74d406da74d6a4260854de957693c060defddd9ce54ef50ef64d7ddc8e075c195c77c1324c2cc6946233c614272803e0661f2ab5c66144522d9c55681eacde96873f7bf74704bed00e551e8ecaebf0a5b58774f60d5f058a047b43e10d3fb5e7ab915f1f3217e0763f75b160a3a6fe58638a6b6023eced83aeb0"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0xffff}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xb4f0}], 0x278, 0x8080}, {0x0, 0x0, &(0x7f0000002480)=[{&(0x7f00000022c0)="21390cade34fdfe3e433a8fe6748fd4d990fb40dbf2db2b9e8cecdda1d10132971beae7792437bac986018d39db36350333388abeff4d3722f099495c258092a2f0a141888f94afcad1ca4af47a822d53a9d26d4cfcd2843fb2723bf6e72c91be4ac5e2d9b88586396d82bf8ca6f4b0b77c4441c366d285aa5810fba230a76a974615f204619560c6d0d3329643e0c200f0f660af0ff895ab634476b68fca19189ba16cb9cd3da8d2a8fd7c2c2645dda3aa8dca1f0afc9dc28", 0xb9}, {&(0x7f0000002380)="7c8d893cbda26e71b03703ec394ba0b1a3818229a28a568362c521f63a8775c67b14e5e0e50d9712bd62670fc86a0bb7c903d33c4fc88f4c72584155ea61a34609935fa8c6db0e2e26c8d77d801d4ee9488a57d2545ee1473ea03e8f5c51e28716f2571c616ea3c5792f621fb7ac97776e62a2c4031eeb5e82aff980ca7995b05a17b6304212141fd91d0faa404ccca59402d757d2274ad855c3077afa18b348146f81ba88ac14df426d2e39ad0dee004ad44ed6f6d7f25a1e69d9cd18dc20e30e09e71d9470807d9a8bfc7df7c795e0481e269a4694d5bc1c751198c8790644b0b55e7bb6b8cb83e2bf59a0d4868ded003a8d892c7003fdb0ae4143ef6e7b", 0xff}], 0x2, &(0x7f00000024c0)=[@assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x110, 0x117, 0x2, 0xf8, "03a7719e4f37605a8b66d9a2f1637fa68581c8c753fcca00f9435befb61d18c4f9e70b61af79a6e2340f95ac6edc65eaffbc78e716e94e51424e3397cd4e1d80ad60e4b54c94ecbe1ad39ed33a13b82b441a5e8d5c03d1f31cb7f18676c1bd7d16eff0fff8e0e07a7cc37d855a914828e00571a735a4f1f9a0130b2d76972343c22701da278d3d11c0f4eb2bdf03693468928a051369bcd8bcf890dfd42e2834a7ebada3171a9012bd1bca3db9d30df42717077ae80b115dfdbf94a54e859d9a16722d31afbd9772591b501d1b70726dfe2c878c5c5739524956a45aad5db56771bfb56d284dedd28a9819dc8c9a510a0255c8f745fc60c9"}, @iv={0x50, 0x117, 0x2, 0x35, "8b9d9f850811d71b1a6645c5e842b028f9cbb5edf053a92981597342d604ffc738c3377dd6b3f28efcf1b73ad7200853c1f9a71da1"}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x800}, @assoc={0x18, 0x117, 0x4, 0xfe}, @op={0x18}], 0x208, 0x4001}, {0x0, 0x0, &(0x7f0000003980)=[{&(0x7f0000002700)="7e65fe3f0085541cbf41480ad887df73517666c574f5c5", 0x17}, {&(0x7f0000002740)="149818f3af37a9707c5effa7c536efdc9a7ae8ef6498ad88a52131209db987cffa5905cc40b1e8b0d8ef5cf313aa1057722612ce66c4033d902a2e0de82f1e8a6e0233037013dec39ff2576eb32100dd8003d035971ae0ebc3e109d54ea39c2d643cf48e81183e795431f05910a91b7def330221bde16cd868b53dbc6f8d12452dbcce077f43b063b7f890d0ae9f4c4828e5bc095fd529b43bfe754fad06d620a9776541ea6e4b70be61a19168714a949df4e0ad8f6e7b6b9540a26c9853d6c01e45dc667742f236a940cd5303d1a02ecdaa28b9f0836697c7a5460f860fe12b7590ffb7018ecf756b931522addcd47b6770c592d03de045b8fb0a007e9778aef865229c80c67fb326e06c572ad5f00f3ef1fd03f36caf908665ac50ea136986a9e898699dc47c62d53a0def3b70585b0a0d1230115b10760cdcc14f0fcb9b97cd34e490e556b50236710ba88aabaca4e4ff4b5be3758486f944e4510fc72d2e53172713f8bf1cbb13501f1b95438fc70c68a629f714a2448dbdedc816093afa511d5b37c8a98f0ff083464f798b584fff01cac32e974b2a4bc309edcd6e34f197ae82571fd1025b64f995e7a8c856f43b1ae9d23f17f6d7cc159af3dabf16a442fbaa471f4f23e994e22e75f6316cb24db896e669cc0bea7ca5a197a974072bcc6d2f30cac89e81fe0c6b2f513738dbf62b7df00aaab851ceded5eb26ada40c3e9fed9b45c3ccdc376f35e12086eb3aa89f83c4ba30e2d1803f56b4cce89f9c8749a03d7a1cb8ff395fb3587d670a79be67e680c774e1d7179e5c83ea13e764a0f659ce478fc00eb50c61156cce0de4a1a5bbc30436cc1cc8ab66d003ed7bc03cfdf3fb928ce500e5f9eba987fea3c8a93c078caca548c1dd4471bcd41d1389211135e7dae0c47b34e9b100732761ac2164ecc1fbcbe61f3a1e902e7e9815c75232043ad60d5aeb1da232bd0fce4bb4f568e41a7100bcc63c6ecee48b45f5bb3130a96aeb7e904a08bd6fab9cf63c05d8451c67288c278c9ed29f9d0209779a6f1cbf162a1930c2e30c754f37f5bd2f1088768e06f47cda7f735c18352857e1525b6c685f551b76b26f703e5d714241001e4d7d0ac12f611dd9dcce35f747097f8406fa06ad678b124e9259856d166d46b00291c0e1b47fa47f6f3a685e928009be1ee70f97e94c6b2dc1095fbe8e4fd46588290c27d47909c00ddfade47d054ac4413c8a83eaf3fc340391a6f3fcb9b23a00e667421d6c66924ad5bdf0854db142a6a55128081dfbeb33ac2d2c781d9733414642ea56d057f639c0cc0fbe2ee106f5d217b0ce1d9145c71ad92b3dfac79d8de8b05b93542f01f341853cfc9fcb1d7cdcda8ebccf165c8964271a0c0124d759a07f8ec31d07f58685b4d6f08e23337ce510b89c180fe52219285b59769b39dfeead76447b85edfa43be6be755de93df955f094fe0d3155a04e08c1c93fb3c2eac7f552de78c4d634bfd7316843daa656dcc2daac4444b4ed300a1aa94c2166a6fc71198e330b3e53bce8c99e2da76e0cd595f63b28c0fafc071a03a89ac87af2991c7e8b72b4119e8b704cacdeec201ceedd9040be93fa12e66981f25a5cd88fc6d6c556a3353e9d079458f830352787b03204156cc1aeac73dc86a43b597c26e19320020bc586e1ec014911914f00289d503f90cddb90ca58fd9f360d49dc9f909e4cc96c9f816ca0855ec7af7bb982075965c784d1bab7a3f2804a6dbd3a928822250991388195e813aa32e1359be34804309f706b8f6f9ad168312f30ff578b0f7d8d7369f13a0b13d23aba99f73b6fb0861611eb7aa0911091fddbdc2ae51961ccf8c4ea2f9e54ad6484dc3a4a71a2a109f35a5fbf800413a78eec959128efaf4ba4996e3e851dc773b19b1822c9588f7d47bf0a6031d318cbcaa6b5105e7c1d639e225e828e5e9c9828ce519ef0e7fac3d9b279b807659f945cbec3c3f0b901d3b21e5c50dd725ada29ea9abc78fa9d4f767b9c5ad6f3d90b3d63306e3385cb79fe6d63b555325d0497302d47ed105027f6b4e7d61cedc4f64667e9c1a0eb1aa7d03cceb98ba8a0cdf3d2416d9547cf3d8c9cbcd89bcbd040f9eb4f7a200639203c30a97f0686bc576b5e88278fb518b3f4c844734468bfa583b6155a0011fd61461ee3f79c3086c456418e8e10c287f15691cfdbaedccef37ea49378724128f5c906311f92f450ea9ebfa399f88e052ebe6e8d806200057d76c251d4526a8ee2da72b2b81add631c89c22463e2247960cc92eb8fc11ac36edd6529070da0bcc725a68eae9c18818e29a3e4be764f011b70cf880ed0872055c7ec914c56f63ac94cae88be67ee9707d827652aa0b393ae17f6c33990d79cf4264b4141a8fa141b8271b9e017cfcd6728e4c14d33d98bf6a2cf685fcc7f35f59f5fab1fd0f98eebaabac676518d2a71c53287f6b08e7b5b666436e19ff53a932840bad1346c0d25e0b1cb49d02024d8812f02d72a520a5e8cfdef55f2e31d5082b4caaf0912e51abfba4f265f45b1c136c2b63de750418e3f21afae5099cfbcc1901e2e1ebf1f515de6133c7c242b8692fa5e257fdba6e07aaab0e8c39584ab485bea46121aa30ecff6e0136875ba385ebc6e351c569b1e5346022242fc35a44bbab17beef191f6d42684259ae4fcfe19676c6476ce36c2e911213f4fbcba8f59f5dec9d7d81c09d06aff26637deba532023702ef07f03e239c6e18b28b8625e47dc88e0a4fff384776355847584b4e8f3e6e1a9a38675bca9cd1fbc3308b880dedf51fc9513d1a28f151e6be59076ec3f0feac07dbcd689e2472dddbf121873088f688bfb2523d79b2c50453eacf548db30d33dbc1bb83a17d1ca24da92b524bc18d466cf5dbf8bbe0b334884fe7a480bffca7cf694adbdf97906c14243bf82920846729020811cb0ddb3b570167b39f130db365edecabfe1abeaf085c752561d2648e2bb8fbd3212429c76f7feceff9d07379fb2acea7c7046a248c182b3dfe64066e5709c7e13d474d9e52c9b08be5ca48d24e76e2f898a402330259d86ba2bcdfeea59fb40fd91a20b423a097494f0d8fc757dd06ca686deb513668fb627783d6897d6deadaa0e65488f625a80fe818d1bab283a0cbcb330606730ac728b3b8457bcb470f9d02593b7e1444cea53be29c6b6eca6cbde9b0f0227ddebecf4b653d55a232951a1726e2eabc72f8f9be95b3974c43606a243cec55ebe0def5afdf04a62defdd3e055b6d34620b1054371d1ec11fe8fc7ec814407fa3ce4577043bdfdda14e44f596a61de1f93e96012ab12744e5a45d6e85f1ef6b2081948ff449f4322f6303cd5dc9548edf2d34f64464b99ed0260788c1007a1caa8cd07fa4c48f8c8cd0458e62163ac97a3de951f0a4a1edce9897f702dcf5ae382286822c03e867816dc840deabe08e673dd07b6600d25fba5c803eaa99f2f449b84bef952943a1d20aebc6c1588153d6e0a14a1ee5c8f2d0188c4e20a30897753bc9e3caa984b0ac547a84f25f6890fb6008e090201ccc39f219e8ae23888b2aded418ab0abc74437ad44d18d8d763a06983e0c172781c5d9270c8a6754f956632a8dd677723cdd74b7ba7d0699523be373f6e341df99eee854ba7cae7572064fd932e323c3cd8225cf325701a0afed8ab2d1977f2e7d7b97eb6e32a0973f9d31ab5d69a2139d6f737d1c7215b064345ffe62242f17dc003dae6a53a7a6ba237fa8f70b7d1bb1694bc2ec3698435026c9221512fa17c4ee5d7bc152602724eedb6360282850bcaefc6ba62f4de184caf9fd615a539b74e457e09c65b9d5ae8eadc53325dda8f0e18b62fb152c4616264269835c018a33edca0b2a2db2b8d0d7bf21e9fbe2544100c97f9c9857e416b6135c7bfae038bd3279f4d1338f4826afad3dbbb9d700ec26bfdf1f302ced7bc2bc21813163ad204414a453cbb043a0dcc9bdc0b74a80be58a487d11af0afe35bb0e4290f64931d641880736eae660183e756ff3167999b4e5ee124e0106556b652392cf10de979b928f1aecd6704c78dd977a688ea5488a1a4e88ce1a0ce4207ccc14746c4db8761a679206040db0f23424f595f147a79bbfd108ec0097aecdad585ec68dc6a2daff913af6e7b9f3e8c0b219259cff8f1d9d3acd42cb33e46b8d83c750c3a9c9e16f4d254054e43948ce442fda6f996bd6b1594b678fb02c2a061fc2a7a707696f24203ef0b1dcd11bef34964d0a4f95300f123f24b905f4f73b55541f44501302b8949efc967b1c798df7b7e3b3866b1d30ffd02bbf1982e9a8cb4f31bc6fcfc92eec2cac8cf5c3216467b1bd4c69dcb41f2d1106853c6800fe7de5eae13d9aebfe16969dc4b792736184e21d4a8af9de2abc1cf98643776b784755f0133335d3b6ffd6b0719981803a494c4dd9dd42db1666dc33c5bdd3ece251884beaf6c1a62c8b173f4359925a6315a97beb900b9fb1860f726fa9316f29638329a3eae69610fb88d3c357c813bb307680f2ba9ec527f2b6bb00f2a8dc83eddb812884d7389c442de75c3f3dc786435a5171fd80c1293114469b6b378f38b46662dbed696fb1a80e75d1eb52642495808a89621e0e2b52e3a884f6df4dae1095c5ee768e8b07cb3755273b54d2bd6167d6a4401af2c962f793cabec7cc09641d5d2d7ad4b09b4ab63bb91a026dc60c0d9d0c4b6de87f5ead8f60fe6827580cad71d5ef98b954c1dfec320239d4030d0d9410255d9773e7d02c1c062303a939348020c65e217d77cf55ee18be623f43f2f36021f5a1c1a8f2d98f4945ad42525c6278abd184256ba38737ffbba088be5cfce3e6ec5bfe99acb63a319f5d58a5a6afc51d664d27b8ccea58dfb17fe4996699a34dafcc74334999ea28c33d475e0f975f9a56315442df9d2b4d6b86640e465a36611ee187151237e4406faa939ab7c6af3a739b38bb3718544c5d6ba43e4a67ba83791940ca941f1d80b90fbc835c0e412c3d0d9f5649db5288df9fffb74632c56d941bb5c51e02991ba6d26674c22b807e318a4ffeb35c8803f78610293e7cf689519619d6a245fbe544187d88a3b49475aa9208ae5f5f6c420a476bfe49a7b16b1fa7db83e698e227097529672c51e42338063c12e476a7387fa0fb511cf8169be39f115d938e7f70f2573d8e85bf633feb248dfe457fcf427aba15041f98cc555ff0b1367238b39000aa1e6ea93e3a8ec2da728537616ddcb500e23ac2f12abefb910934b2433dd03b29c74a8989cce91156cc5ae3bb236ba90d76839be964a2657ca82076954b0f3a5dd7ec4a3150f8073b7c9e545591869ad2b04d16a356aada3521382da6b195bb86cf2757fe4291199a14d99e6766d594743033045ec8efe164f046015ace0b55638dcb486ec79c96206fe3bc6a41c6e32d25c0c64429014f5acb54454eb7bf83303a869c0a5a5ff9033e184c74315e4978adfe033d26a273c5f4fc56d4564b9fb86801b4381e4fe6177312e91dd44709b6e6913dc0a20f26016933a6af356ef4890508be3a62fb4c7ee9d7895ca871dec8634b1b91fad1286a733b7db67e3779c2c6b285e588650eb4b29112a44afd6403b72bf2b963881646c242a1437780d05e3a16cae3b778e06908d89aa05bec327a7dba3df9abc28ad30fbf2463047918fb5fc2f6049546369ad85bb7ae9506afb30c24e92e283d53f5d519448e9720e3e37866ecdbc0ccf7f1fdee2286767305901035b10b3bf26d9dcd5e7378803a12dbc23fca63e91f2135a7dfe33c983981c961c4257edfd68e1d45821ba0aaa16176b7dd97658ea", 0x1000}, {&(0x7f0000003740)="6027c999b151b276e84ee468dd37949cdd2276a04ea5e05fc0a0c545953b0132c4ec7a95d25db8f6fae448995a26babec811572297b29703ba8bcce3ed38965f01c903eb32ce514b24375b4c3b48156458c2d8531ec8a4c4106ffb007a5632108c28aea08788ee5b1005a3750980cda48a93a04db54629d6ae37de6dc9b8e5269a", 0x81}, {&(0x7f0000003800)="be731cbbf570ee17fab1801b6ac670a115e437ff90379913996e718c1553ef3b57f332dff7f6bc259e536e7c14a947b4e95b0ce21a56313bcfb17c68b1c7ab26b4c21c62e4b58079abc5e0136a0316056a1accceaa9bf8de44d4939e8b11996e43937896f5e292f065e9bd9561e752e3bd28769a5ac057676e711faab99d7ad37357421c3ce70e", 0x87}, {&(0x7f00000038c0)="1ddb043a93e3f469bea5ec67330e7976d8e136c499e4f995e9e390058d5443ab8a0692d9985b4a289695aa80d0c163bd2cb8fa8eb57490c984f30f1fce5df7e3e54ca356b57ee365d2f9b4e4dd014ccb7cf7e92005ed38b65284a543416528b7b681d5f96e1259820e6e77548788746bf7fed21c70e4be51b492ea8a42ff5f29cf7960055fea7707046d47d917", 0x8d}], 0x5, &(0x7f0000003a00)=[@iv={0xa8, 0x117, 0x2, 0x94, "ff91f7be016a6bb0495646251f16a444f0bad2b2f31f9d08554e42768a9f988e3fedf68b2a967fa245ec69bd341ea193c6fe2433b9a6becf92f1f807b2566e9d1408d4c992c1a8718a36b507f2048e90d241e1ffd34975c5562be753ce964251dcd0a34eb85839e8eda2db3caece703f0287ede1b28fc98a0aa31ab185adfcbe2ca2fa144e6bc200fc1af2345253adc96d4d9d85"}, @iv={0x28, 0x117, 0x2, 0xd, "e036431f4656060804c6a31bf4"}, @iv={0xc8, 0x117, 0x2, 0xb2, "d7016ece2a459184dab499608ba83402cd8677b828be6445736def66d096dcba47994dba38e067591a60c05493181513256b89d7a02ae97a6d508e407012790853bfede2ae2e2ac0102a3e079755546f1eb76e2f37f689d14264f092b9c95228a5a2255266e125f8e06c52b0bf63c67adbab4ad19d5830a2cdf391425aa04f30a3accb58c3432e292b2e8ca23db50045b781b3b621a25ab80d274ebd9850759b2fbda9eba987cec0350db61eb8009152e00b"}, @assoc={0x18, 0x117, 0x4, 0x80}], 0x1b0, 0x2040040}, {0x0, 0x0, &(0x7f0000005dc0)=[{&(0x7f0000003bc0)="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", 0x1000}, {&(0x7f0000004bc0)="98968f80fbd889d1a0cc75c10b56aabb1ade70281c698721cfc9385d1ad3cf3e1b17f36b9012325bc981bea35238a01955794d28feef45200a05db00bc7ca15baddbb200e03c6660333f63c9f759ba7f09e072d41757b296defff784a7de86373c44868bd58a7e38d8837949490bb55b0f7053c3200bc4ad21f0aed51f34fa7f2003d4097cfaafce5ac769119d9458b95459da7e8036524fade7deab10986234ea73a347be844fd26c0f2daf9efd5e49328914a6bdafe168316b7ecd2c01924faf45b2651dd165671fca2e95de61c072f94b1d0baced17d9260df13a4f7178b3bbaa", 0xe2}, {&(0x7f0000004cc0)="7bc48c8fd77d29ac326520d09fa7e53a1943063df387d02f3053c838c2cfded04b73d64121", 0x25}, {&(0x7f0000004d00)="208c1eda091eaa366474f841f22966d9f5991bf4059bbf1691b88347955bf4aeae3304f790c0749917741fcd69521d8a149ed77a65b07e04899d79dec3f144661cb3c7ed1f6f543bae412381824106886a526a4a9042e60e3b94e2d5525f7a3e4254c8c99d2e8410fb35d55e", 0x6c}, {&(0x7f0000004d80)="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", 0x1000}, {&(0x7f0000005d80)="d1e921a748440f3d2cc410f42dd5fd0d6fb9954939da57bc44efb6b1b39bdd98110ab9501c596d23e0d9ee40d6087c", 0x2f}], 0x6, &(0x7f0000005e40)=[@assoc={0x18, 0x117, 0x4, 0x4}, @assoc={0x18, 0x117, 0x4, 0x42}, @iv={0x58, 0x117, 0x2, 0x3f, "ed5ba9dae3ac74d7d3e8f7c988067733e6b7aec5d1df8a720c60f7d4b626f742444f1abc4a7b919fca120332a22109cde70c1b0c51548e556bfc81b02e1286"}], 0x88, 0x4000000}, {0x0, 0x0, &(0x7f00000060c0)=[{&(0x7f0000005f00)}, {&(0x7f0000005f40)="648d1a9c407861aa4c25439e4fa36cfe6d85f3006a0879c20ee184d212b6e1758cf9720995220a3799795fd391efd9462a9d69139be273fc158df627c8776b10982c2460545f3490fc22a761efc904e02ea127cc9b2c37a83e8c25b8f5e80c2ae5fdd343d07a60fd1424cfc64b11e0c7082be336e4dbc5867ae78605bf40f03dfadb1fcb04d878e0b8f9a61de631cfe6962f2a544c8aca6b9a0553a3d08be19b9fa8b9bdbb6b6eaa8f8f9eae166fdd6f6d63e3062ca48b6c0c334562af07", 0xbe}, {&(0x7f0000006000)="6b67be722c14680d337cf4ff4d426c3e7679e95a9b7d27d0ff913d51d8aaca9a376f5fd0bc9fcd02a0cbc8b45b472a75cf443b40d4c116979b11ba96f47617269bc5b8e23ff0260c744795cbc306b98ee259d7f52a52b3e74d57d309b0632e946187fbc66772648a6cc2ac3d3d4fba2a9cba2c38675ad022fdce4b30116ee69f38d9b5b9c8ccaa1650029d6a8d8efb186eb6aca2d4b049a5831080f8b29b4705c54870d602302948301a", 0xaa}], 0x3, &(0x7f0000006100)=[@assoc={0x18, 0x117, 0x4, 0xff}], 0x18, 0x5}, {0x0, 0x0, &(0x7f0000006180)=[{&(0x7f0000006140)="52335ae402ffcf1b73a2ae27de968496d9e7cf2f151f5243fe94557e6bb932e11db70c21794e9c2410f33875b10c1fbe29583b01c8b3d00c63ce28", 0x3b}], 0x1, &(0x7f00000061c0)=[@assoc={0x18, 0x117, 0x4, 0x40}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0x60, 0x20000001}, {0x0, 0x0, &(0x7f0000006340)=[{&(0x7f0000006240)="48ef05748763ab4228afec150cf0e379b9098a64c3fb344edd8d17a99267bdddb6d49fbb9c5f65882161bc229d9ae347308d954b0c30c1c81185bafb313d595ab7cade668926d7a6d71582b1edf52a37d5af70df70c3f883c74745b8af5e7769cbcce03f816cbf18f8f28739c07a51435d3f854cf389320af625037efd6fe921602464b009cdf9c6b37850c43f0bcd032dbaeb904a16a48c50658148b644c6da867f3c2267dea484d634a757f98ff5f6e3eb0dbebf0bbbe5ea391b5f2c38c6b333c89836ac0de0fe7d49eeb45f05745419f8ff625aaedf628ea3b93815ed83965875afef55a52e13713274b32a34", 0xee}], 0x1, &(0x7f0000006380)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xffffdaeb}], 0x30, 0x400c040}, {0x0, 0x0, &(0x7f00000085c0)=[{&(0x7f00000063c0)="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", 0x1000}, {&(0x7f00000073c0)="4c0673ab1966ccd670289701bf3b8a928cefdd840cd747030e1a097c0b7a23e1041b10331dc4122abe8308c1759709f345177f96ef87b7644a5dda2d15ef71ca2405520ed9615496847e8d2804c3b1097ccbe5d0e0172f776177f726f955a2fb5f44e3c42bbbc3eb17a31497403ce43f5e88f5db72d1f99fb4c722ae86826da386503c5a85ea4f826b287d8fa38169226d8f4d385e512bdd5a29936c2300d4b47646d56facd8a91ed6ce22ed2d21006f598a49a3f74f33236412046d8e69485399b19e02d2e3da54252b61302ace96a3543395e345c9d485eab1d9631ced2e", 0xdf}, {&(0x7f00000074c0)="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", 0x1000}, {&(0x7f00000084c0)="2a351d0d32d39ae2f193b156572b37a81b322828e0e3eb2dd867004ce31912d8235869429dcc679e8ca687f824b50f0c24515c6f44d6ecc59200cf2431b3827c291d069b954f83ade9cd0cd645b3cf69225c720323cdde7889087cd09b592ba034aaca43dfe47727f156c7fad355004756cd618b7016ef117fd96f0fe8e60dd987e750e5eb863bda13375b08874380e5b3d596b24c9f3c49800a226d2e32da5aba8b13b0e8593a4ca3f88c266e4196afcefcd22728a9936d337c5260f45a9a098acdc002f6e0a07c7db7359a273d27962229437b79ae445a56e483d35a376b01a720350bf46bbf5022682ee8c86a279c116d", 0xf2}], 0x4, 0x0, 0x0, 0xc801}], 0xa, 0x4004) ioctl$KVM_IOEVENTFD(r6, 0x4040ae79, &(0x7f0000000100)={0x10000, &(0x7f0000000080), 0x1, r7, 0x1}) [ 804.218413] kvm: pic: non byte write [ 804.224726] kvm [8433]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 [ 804.238353] kvm: pic: non byte write [ 804.243641] kvm: pic: non byte write [ 804.249087] kvm: pic: non byte write [ 804.249208] kvm: pic: non byte write [ 804.253584] kvm: pic: non byte write [ 804.261683] kvm: pic: non byte write [ 804.266176] kvm: pic: non byte write [ 804.269162] kvm: pic: non byte write [ 804.274042] kvm: pic: non byte write 14:01:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:17 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 804.449827] kvm [8443]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 14:01:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x3}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0xb}}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x50}}, 0x0) 14:01:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:01:17 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/ttyS3\x00', 0x0, 0x0) 14:01:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:17 executing program 1: futex(&(0x7f0000000000), 0x5, 0x4, 0x0, &(0x7f0000000040), 0xfffffffe) 14:01:17 executing program 1: futex(&(0x7f0000000000), 0x5, 0x4, 0x0, &(0x7f0000000040), 0xfffffffe) [ 804.628689] futex_wake_op: syz-executor.1 tries to shift op by 4095; fix this program [ 804.647885] futex_wake_op: syz-executor.1 tries to shift op by 4095; fix this program [ 804.665587] kvm [8461]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 [ 804.939793] futex_wake_op: syz-executor.1 tries to shift op by 4095; fix this program 14:01:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, &(0x7f0000000100)="2088f39c5f3eb0bda7a300babe2bfe12b33cdaee9e3cc0ff5c560ec27c70f6703395095409094409842daaeebb502e93dfd323e52db4d7224bf2e3460f83db56119f631fe9dedce92453498db10cd1"}, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:01:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:17 executing program 3: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:17 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$KDSKBLED(r1, 0x4b65, 0x7ff) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) ioctl$TIOCGPTPEER(r3, 0x5441, 0x1) 14:01:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:17 executing program 5: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000780)='gtp\x00') sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x20, r0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r0, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_I_TEI={0x8}, @GTPA_VERSION={0x8}]}, 0x2c}}, 0x4000000) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x19, 0x100000, 0x0, 0x0}) 14:01:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:01:17 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:17 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)=0x7) 14:01:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000140)) fsetxattr$security_evm(r1, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v2={0x5, 0x3, 0xb, 0x6, 0xb6, "55659b2e24eefb29a7b96221e27701cbd8e4309bb9b194b2284496bf73fdc1704b957738a270a790512bff7d93e000cc2b5bf079000fb2d6543417279000f5feabf445b85a98a328439a354d3392bd832cfbdce142789dbffcfdcac5c894a5a9dbd4a3b9cbfd467a8827412fcaf3ab4f1e1260f95d9e650802caad4caed8703801d9da721572746abd9a5e4ec6ff87f3062f78c4c62899b0ad16d5333e987dd5596b8d8335d8ebb0d264373ed4edae18d013ef20ec98"}, 0xbf, 0x2) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x1, 0x19, 0x4, 0x0, 0x0}) [ 805.763283] FAT-fs (loop4): bogus number of reserved sectors [ 805.769153] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, &(0x7f00000001c0)="2088f39c10bcb0bda7a300babe2bfe12b33cdaee9e3cc0ff5c560ec27c70f6703395095409094409842daaeebb502e93dfd323e52db4d7224bf2e3460f83db56119f631fe9dedce92453"}, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:01:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TIOCSSERIAL(r1, 0x541e, &(0x7f0000000100)={0x20, 0x0, 0x7fffffff, 0x1, 0x9, 0x800009, 0x6c, 0x5, 0x4, 0x6, 0x2e, 0x7, 0xe07, 0x400, &(0x7f0000000040)=""/165, 0x2, 0x29a, 0x4}) 14:01:20 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/ttyS3\x00', 0x2c800, 0x0) 14:01:20 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:01:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x80080, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x10082, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000080)={0xfff, 0x7}) 14:01:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94, 0x0, &(0x7f00000001c0)="2088f39c10bcb0bda7a300babe2bfe12b33cdaee9e3cc0ff5c560ec27c70f6703395095409094409842daaeebb502e93dfd323e52db4d7224bf2e3460f83db56119f631fe9dedce92453498db10cd1a0c09bd2e1a614d783c46678dc4b15dd1a2b8b55b49178fcc1ffcdf6a6bdf08eb5b9f1105a201f36c3815a7e33c146beacc0f2086994162282cff700"/148}, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 808.392824] FAT-fs (loop4): bogus number of reserved sectors [ 808.398839] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x294, 0x2) socket(0x11, 0x800, 0x6) 14:01:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSSERIAL(r0, 0x541e, &(0x7f00000000c0)={0x20, 0x3a3f, 0x1, 0x400, 0x1, 0xb4, 0x6fe6f463, 0x400, 0x0, 0x40, 0x40, 0x0, 0x101, 0xf7bc, &(0x7f0000000040)=""/93, 0x8, 0x10000, 0x80}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:23 executing program 1: 14:01:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:23 executing program 5: 14:01:23 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:23 executing program 5: 14:01:23 executing program 3: 14:01:23 executing program 1: 14:01:23 executing program 5: pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x400) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socket(0x4000000000010, 0x1000000000080002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x2f4, 0xcc, 0xcc, 0x1cc, 0x1cc, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x4, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0x0, 'veth0\x00'}, 0x0, 0x70, 0xcc}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv6=@loopback, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}}}, {{@uncond, 0x0, 0xdc, 0x100, 0x0, {}, [@common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv4=@empty}}, @common=@unspec=@state={{0x24, 'state\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x1ad) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x420000015001}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000240)={@void, @val={0x3}, @mpls={[], @ipv4=@icmp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @timestamp}}}, 0xff88) 14:01:23 executing program 3: 14:01:24 executing program 1: 14:01:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 811.459336] FAT-fs (loop4): bogus number of reserved sectors [ 811.465369] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:24 executing program 1: 14:01:24 executing program 3: 14:01:24 executing program 1: 14:01:24 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:24 executing program 1: 14:01:24 executing program 3: 14:01:24 executing program 5: 14:01:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:01:24 executing program 1: 14:01:24 executing program 3: 14:01:24 executing program 5: 14:01:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:01:24 executing program 1: 14:01:24 executing program 5: [ 812.332794] FAT-fs (loop4): bogus number of reserved sectors [ 812.338746] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:25 executing program 5: 14:01:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:25 executing program 3: 14:01:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:01:25 executing program 1: 14:01:25 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:25 executing program 5: 14:01:25 executing program 1: 14:01:25 executing program 3: 14:01:25 executing program 5: 14:01:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:25 executing program 1: 14:01:25 executing program 3: [ 813.243397] FAT-fs (loop4): bogus number of reserved sectors [ 813.249345] FAT-fs (loop4): Can't find a valid FAT filesystem [ 813.377478] kvm_hv_set_msr: 284 callbacks suppressed [ 813.377488] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000000b data 0xfffffffc [ 813.404235] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000012 data 0xfffffffc [ 813.415105] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000019 data 0xfffffffc [ 813.425454] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0xfffffffc [ 813.434972] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000027 data 0xfffffffc [ 813.444767] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000002e data 0xfffffffc [ 813.454101] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000035 data 0xfffffffc [ 813.463587] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000003c data 0xfffffffc [ 813.473331] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000043 data 0xfffffffc [ 813.482895] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000004a data 0xfffffffc [ 813.492724] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000051 data 0xfffffffc [ 813.535490] kvm [8720]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0xffff0020 14:01:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:26 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x6002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 14:01:26 executing program 5: 14:01:26 executing program 3: 14:01:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:26 executing program 3: 14:01:26 executing program 5: 14:01:26 executing program 3: 14:01:26 executing program 5: [ 814.192893] kvm [8747]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0xfffffffc 14:01:26 executing program 1: 14:01:26 executing program 3: [ 814.234693] kvm [8747]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0xffff0020 [ 814.418759] FAT-fs (loop4): bogus number of reserved sectors [ 814.424818] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:27 executing program 5: 14:01:27 executing program 1: 14:01:27 executing program 3: 14:01:27 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:27 executing program 5: 14:01:27 executing program 3: 14:01:27 executing program 1: 14:01:27 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$char_usb(r0, &(0x7f0000000100)="9f", 0x1) sync_file_range(r0, 0x0, 0x0, 0x6) 14:01:27 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4, 0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000300)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) inotify_init1(0x0) r3 = dup(0xffffffffffffffff) inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x2000484) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r4, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000200)="7f181eed0eb9197945575519829bb1ba1d7cf02d301466bb5f9a1792b8f0238828f30b91d38b3ebde9e99a7889ff52120920e0bad79b89914bb2ef0c9207dbf381bc8d105d4524c50e6efbfd725e237a934bea2a420c1ca9e285498705b809f01195b2cf11961e7c139ffc57fa537173c7cf1dc8ea855bae8799b2b2f2877b2d22f4f48aa1e59e33f684f807bec5f6", 0x0, &(0x7f0000000100), &(0x7f00000003c0)="c472515c471c89e490518b4b70f06733f1e6f06514a007cff3", 0x6}, 0x38) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 815.189980] kvm [8780]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0xfffffffc 14:01:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 815.251874] kvm [8780]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0xffff0020 [ 815.346575] FAT-fs (loop4): bogus number of reserved sectors [ 815.352612] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:28 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:28 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:28 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x22, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000340)={@local, 0x80000000, 0x2}, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440), 0x12) r3 = socket(0x0, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 14:01:28 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4, 0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000300)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) inotify_init1(0x0) r3 = dup(0xffffffffffffffff) inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x2000484) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r4, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000200)="7f181eed0eb9197945575519829bb1ba1d7cf02d301466bb5f9a1792b8f0238828f30b91d38b3ebde9e99a7889ff52120920e0bad79b89914bb2ef0c9207dbf381bc8d105d4524c50e6efbfd725e237a934bea2a420c1ca9e285498705b809f01195b2cf11961e7c139ffc57fa537173c7cf1dc8ea855bae8799b2b2f2877b2d22f4f48aa1e59e33f684f807bec5f6", 0x0, &(0x7f0000000100), &(0x7f00000003c0)="c472515c471c89e490518b4b70f06733f1e6f06514a007cff3", 0x6}, 0x38) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:01:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 816.528747] FAT-fs (loop4): bogus number of reserved sectors [ 816.534820] FAT-fs (loop4): Can't find a valid FAT filesystem [ 816.683515] kvm [8851]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 14:01:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:29 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:29 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 817.330408] FAT-fs (loop4): bogus number of reserved sectors [ 817.336407] FAT-fs (loop4): Can't find a valid FAT filesystem [ 817.420559] kvm [8890]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 14:01:30 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x40a402, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000001c0)=""/85) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x11d003, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x7fff, 0x5, 0x3}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r4, 0xc0045002, &(0x7f0000000080)=0x10001) socket$pppoe(0x18, 0x1, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r4, 0xc004500a, &(0x7f0000000100)) sendfile(r4, r2, 0x0, 0x1c01) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r6, r5) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x1000000, 0x0}) [ 817.569040] kvm [8898]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 [ 817.577162] FAT-fs (loop3): bogus number of reserved sectors [ 817.583835] FAT-fs (loop3): Can't find a valid FAT filesystem 14:01:30 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:30 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 818.295284] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 818.303851] FAT-fs (loop1): Filesystem has been set read-only [ 818.309906] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:30 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 818.457851] kvm_hv_set_msr: 392 callbacks suppressed [ 818.457865] kvm [8942]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000000a data 0xfffffffc [ 818.472311] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000000a data 0xfffffffc [ 818.476739] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000016 data 0xfffffffc [ 818.491546] FAT-fs (loop4): bogus number of reserved sectors [ 818.497479] FAT-fs (loop4): Can't find a valid FAT filesystem [ 818.511249] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000001c data 0xfffffffc [ 818.528194] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000022 data 0xfffffffc [ 818.535850] kvm [8942]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000016 data 0xfffffffc [ 818.538331] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000028 data 0xfffffffc 14:01:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 818.570835] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000002e data 0xfffffffc [ 818.595813] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000034 data 0xfffffffc 14:01:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) ioctl$TCSETXW(r0, 0x5435, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f00000004c0)={0x0, 0x0, 0x11, 0x2, 0x2d, &(0x7f00000000c0)="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"}) [ 818.672187] kvm [8942]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000001c data 0xfffffffc [ 818.715284] kvm [8943]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 [ 818.775787] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 818.784340] FAT-fs (loop5): Filesystem has been set read-only [ 818.790534] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 970769) [ 818.804423] kvm [8942]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 14:01:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 818.946265] sp1: Synchronizing with TNC 14:01:31 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="9fb0895c242efe679d5d26cfe63472ecc13fb31680fb36e8dd02cc52381baaac473ffa06b8d0ec047d74eadf922886b9f71e216fae3450c67d0c045fdb4f4a605e31f714152b708ce9cb0117ec1f53feb2982cb4bdd9afac808504b0bd1d2002f85f963c27531f14223da67338cf11912b5af795d7614e06ff34f481126d61c77efdbc2e501c302586ca802d73459fcafdcd1e0afd9a8805b7500a141f03ff32f9e1a6e7e2c6225d02833314115d04b13c42897f67bda94738656db43f158ad3c2afdd", @ANYRES32=r0, @ANYRES64=r1], 0x4}, 0x1, 0x0, 0x0, 0x20000811}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r11 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r10) keyctl$unlink(0x9, r11, r10) r12 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r11) keyctl$read(0xb, r12, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r12) r13 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r12) keyctl$instantiate_iov(0x14, r9, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r13) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r14 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r8, 0x0, r14, 0x0) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000440)="b5b3e1dba9f8abd1", 0x8}], 0x1, 0x3) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r15 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r15) r16 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r16, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r16, r16, &(0x7f00000001c0), 0x8080fffffffe) 14:01:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x1) ioctl$TCSETXW(r0, 0x5435, 0x0) ioctl$TIOCSSERIAL(r0, 0x541e, &(0x7f00000000c0)={0xb4, 0x3, 0xffff4738, 0xc, 0x1b5, 0xffffffff, 0x7, 0x1, 0xe4e, 0x1, 0x0, 0x3, 0x3, 0x1f, &(0x7f0000000080)=""/19, 0x7fff, 0x3e53, 0x1}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = syz_open_pts(r1, 0x800) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000140)) 14:01:31 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 819.106602] sp1: Synchronizing with TNC 14:01:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 819.133308] sp2: Synchronizing with TNC 14:01:31 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(0x0, 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 819.401845] FAT-fs (loop4): bogus number of reserved sectors [ 819.407782] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:32 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, 0x0, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 819.618811] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 819.627276] FAT-fs (loop3): Filesystem has been set read-only [ 819.633659] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:32 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:32 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 820.195833] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 820.204395] FAT-fs (loop5): Filesystem has been set read-only [ 820.210585] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 970769) [ 820.622641] FAT-fs (loop4): bogus number of reserved sectors [ 820.628900] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:33 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b0a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc3874f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e58bff4d666456f693e0b868a011da94dad2326e1cec9fbb0e5dbbc68e05233afad928fb3a591b1e5ad0f7e567966e5edd0d5479971bf486c2f453bf96bfc04aba6a987c083d3a88fd4fd9e391243c04529f6e06d2bcae6ee812fed1cde8dbf379fbaacbce07dff4e1df7b13863aae1df80e4967055fedcba49962bfae67d1c5312df2c9c344d311c4ef7c8a13a54094db3ded687bfe2d81a99acbbac14e88aadf5a7ba5b7b9811b80ef55cacda10"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:33 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(0x0, 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 820.741273] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 820.749917] FAT-fs (loop3): Filesystem has been set read-only [ 820.756176] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:33 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:33 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000780)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a32000000000500010007f33bc375bd82f8a8c79805fb9f3ec7e3928e256134a630141757a9f1b1b53238e0419a0e2d442b1929bf170c007cf75d2eb7dcac0500d0a9ddba8428b24a6b1920db90705611f0f40c05df6098998bb04697c8d7f33d6fab8d86adae90a287678cc3add6413dae2f5ab3fd24ff85369eeccec4c71f68820c50603e7727c5d2f75a33c126f890955cb5e7ec7f111a4a77721b38c502bc289e0de1fd416522eda845c7070b5a65fab4e905dba3b2813d676e393ddb7ec513858a1c394f2af55b7ecd1f43ae3930d6cd3116ed9a2cc93c1078a2e3e20b514a82a7b8586372a17043598e90fa854387a1be2f9c197d24a473b7a15d1adc8410a0f638f6a619048e83bc7a086d22bffc12570d75305dd11ce31d00f30b757582cf008a77db3d2a5503ba80536d46561206f969ce8b0ac2ca51babe705b47f983cf1f7d9d09b810789082dbadc041951039c85155885176a0110a50a8bc895af3655d9e72f0d81be643cf8610037fc429582ce98cc99540d055b695ad15bafc00571f3d3b7dc2b085ac064d76e4cbc91f4e43392e54b94e6fb8e3bf1bde9c6966af25f9e20a29c631c1bf80b59972046f41fecf6749115379f491affd18037457f18161d778eb1f7a86af0a082749e7328b7678c21c2783c818629ee5963417669768e1d6b4721498b9cca151"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r8}, 0x0, &(0x7f0000000380), 0x0) r9 = add_key(&(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r11, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 821.343598] kvm [9075]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x40000020 data 0x100 [ 821.382702] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 821.391059] FAT-fs (loop5): Filesystem has been set read-only [ 821.397071] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 821.979001] FAT-fs (loop4): bogus number of reserved sectors [ 821.984952] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$3(0x3) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000040)={'vlan1\x00', 0x3}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:01:34 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:01:35 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:01:35 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$bt_sco(r2, &(0x7f0000001380)={0x1f, @fixed={[], 0x12}}, 0x8) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000300)=""/4096) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000480)={'virt_wifi0\x00', @remote}) setsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000180)="4c9da648d53c2ca3f9c7912b9d88641130da1bb353c4f9fd4886abd67ab5802a990c77d849b2cb564f1aacc0b945fbc6e8daf56a7ac59b50312c14bcb70f2111a8978be0d8067cad70c3fc362ac1eab948ca13e7c76b2df85ee66cebf7e1cbdc4f6548369e0470947b6f8026779a6547c13396db032a9689f4fda14390d966f56eeae8dea1ed1d34e2762868d1b754c93484fde7cabc9d13ea701f4d788eda1e4d03", 0xa2) pipe(&(0x7f0000000140)={0xffffffffffffffff}) prctl$PR_SET_THP_DISABLE(0x29, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) connect$ax25(r4, &(0x7f0000000080)={{0x3, @default, 0x7}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null]}, 0x48) ioctl$TCSETXW(r0, 0x5435, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000100)={0x80000000}, 0x4) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000080)) fgetxattr(r5, &(0x7f0000001300)=@known='com.apple.system.Security\x00', &(0x7f0000001340)=""/43, 0x2b) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000080)) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000080)) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000400)={0x1, 0x1, 0x1000, 0xcb, &(0x7f0000000240)="b06d40505e52898ff0dc77feb1ca134a9182ff4615af5d4cd53b7908906152975895a40b4a9efd1589fb56d49ddbad33afa66077deeb1f2564e487fe2b448b7b35873976b9d66ce6449fa9cd2e9143f0269ab81206aa8d85fd64d4c0422dde25d3f682a09c9ad77768ff941caf58b2f4ca344433f296d0b2971807b9065c27b06caddbb1c4218fce5e6741a9da3618bc3619bca68ced716367a9b57f653c4acb39c3832fe8f46da8665c7925016e51ff218e0cb50bbd76fea8229493970ee5d5f4b01f723272e6e1fb1ef9", 0x8b, 0x0, &(0x7f0000000340)="41bf7c7ea24209ee2c2b4d664a8c6f56c4c804e9bb1f7b4354799a44eb843c83b6c620ce96c4180fdce09bbb2da25db91867f203c818cf954296060402a628182b736cc2cb42ff28e7b2b05e7e58a3ae805dbeaaf2744f315c14398c29f68594972f4813d5b379b7b678d93d3641cf948100e3633105ae49444ffa50c9ef1e59d499b270599e909d79f865"}) 14:01:35 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) [ 822.808276] FAT-fs (loop4): bogus number of reserved sectors [ 822.814540] FAT-fs (loop4): Can't find a valid FAT filesystem [ 822.950566] sp1: Synchronizing with TNC 14:01:35 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) [ 823.323171] FAT-fs (loop3): invalid media value (0x00) [ 823.328704] FAT-fs (loop3): Can't find a valid FAT filesystem 14:01:35 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000080)={0x7, 0x8001, 0x2f, 0x9, 0xffffffff}) [ 823.769288] FAT-fs (loop4): bogus number of reserved sectors [ 823.775407] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:36 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 823.959159] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 823.967728] FAT-fs (loop5): Filesystem has been set read-only [ 823.974073] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:36 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 824.309136] FAT-fs (loop1): bogus number of reserved sectors [ 824.315347] FAT-fs (loop1): Can't find a valid FAT filesystem 14:01:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$KDSETLED(r2, 0x4b32, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000080)={0x3, 0x8}) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, r6, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x80, r6, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x1f6, 0xc00000, 0x3, 0x1, 0xff]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x81}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7, 0x3]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3f}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x3, 0x1d, 0x2, 0x6, 0x6]}]}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000001000000000000000000000000000000e000000040000005803000000000000d0621e00d0000000b8010000d0000000880200008802000088020000880200008802000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f5054535452495000000000000000000000000000000000000000090000006f0000004c000000070000000800000005000000fb1a0000af0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) 14:01:36 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:36 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:37 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$KDSETLED(r2, 0x4b32, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000080)={0x3, 0x8}) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, r6, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x80, r6, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x1f6, 0xc00000, 0x3, 0x1, 0xff]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x81}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7, 0x3]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3f}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x3, 0x1d, 0x2, 0x6, 0x6]}]}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000001000000000000000000000000000000e000000040000005803000000000000d0621e00d0000000b8010000d0000000880200008802000088020000880200008802000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f5054535452495000000000000000000000000000000000000000090000006f0000004c000000070000000800000005000000fb1a0000af0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) [ 824.583742] sp1: Synchronizing with TNC 14:01:37 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:01:37 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:01:37 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$KDSETLED(r2, 0x4b32, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000080)={0x3, 0x8}) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, r6, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x80, r6, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x1f6, 0xc00000, 0x3, 0x1, 0xff]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x81}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7, 0x3]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3f}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x3, 0x1d, 0x2, 0x6, 0x6]}]}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000001000000000000000000000000000000e000000040000005803000000000000d0621e00d0000000b8010000d0000000880200008802000088020000880200008802000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f5054535452495000000000000000000000000000000000000000090000006f0000004c000000070000000800000005000000fb1a0000af0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) [ 824.934963] FAT-fs (loop4): bogus number of reserved sectors [ 824.940998] FAT-fs (loop4): Can't find a valid FAT filesystem [ 824.951617] sp3: Synchronizing with TNC [ 824.965412] sp2: Synchronizing with TNC 14:01:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 825.395561] sp1: Synchronizing with TNC 14:01:37 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0xfffffffffffffffe, 0x12) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200800, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 14:01:38 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x8100000, 0x0) r4 = socket(0x840000000002, 0x3, 0x200000000000ff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) sendmmsg$inet(r4, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40), 0x0, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xa0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x68}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{0x0}, {&(0x7f0000002100)}, {&(0x7f0000002180)="6209ed67941216fdf598146857a68b5a81019042838b95e9512b2b0641e40e569df37b073c12353fc2b9014cb0a3", 0x2e}, {&(0x7f00000021c0)="857bc0bd4d221353bcdbb9b4ffc9fc825e79ab2508b87a902028f0b971dee8b8180b46629feb2882", 0x28}], 0x4, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"/1313], 0x521}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="98c45fb1f9d40ffa9b8ef0", 0xb}, {&(0x7f00000023c0)}], 0x3}}], 0x4, 0x14006081) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000080)) ioctl$TIOCGDEV(r7, 0x80045432, &(0x7f0000000180)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in6=@mcast2, 0x4e24, 0x400, 0x4e23, 0x7329, 0x2, 0xa0, 0x30, 0x32, r5, r8}, {0xc7, 0x2b43f64d, 0x7, 0x7, 0x96aa, 0x9, 0x2, 0x4}, {0xcc, 0xf502, 0xe2, 0x3}, 0x1, 0x0, 0x2, 0x0, 0x0, 0x3}, {{@in6=@mcast2, 0x4d2, 0x6c}, 0xa, @in6=@remote, 0x34ff, 0x4, 0x1, 0x9, 0xffffffff, 0x10001, 0x73}}, 0xe8) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 825.576887] sp2: Synchronizing with TNC 14:01:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) [ 825.843753] FAT-fs (loop4): bogus number of reserved sectors [ 825.850160] FAT-fs (loop4): Can't find a valid FAT filesystem [ 825.955172] sp3: Synchronizing with TNC 14:01:38 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r5) r7 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r6) keyctl$read(0xb, r7, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r7) r8 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r7) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r9 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:01:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:38 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, 0x0, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:38 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:39 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0xfffffffffffffffe, 0x12) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200800, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 826.863465] FAT-fs (loop4): bogus number of reserved sectors [ 826.869548] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:39 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:01:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 827.119857] sp1: Synchronizing with TNC 14:01:40 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:01:40 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0xfffffffffffffffe, 0x12) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200800, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) [ 828.235491] FAT-fs (loop4): invalid media value (0x00) [ 828.241198] FAT-fs (loop4): Can't find a valid FAT filesystem [ 828.372083] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 828.380817] FAT-fs (loop1): Filesystem has been set read-only [ 828.386795] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:01:41 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:01:41 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:41 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) [ 828.693272] sp1: Synchronizing with TNC 14:01:41 executing program 1 (fault-call:34 fault-nth:0): r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 829.121068] FAT-fs (loop4): invalid media value (0x00) [ 829.126462] FAT-fs (loop4): Can't find a valid FAT filesystem [ 829.211327] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 829.219657] FAT-fs (loop5): Filesystem has been set read-only [ 829.227017] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 970769) 14:01:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000100)={{0x5}}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x5], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 829.587758] FAULT_INJECTION: forcing a failure. [ 829.587758] name failslab, interval 1, probability 0, space 0, times 0 [ 829.599152] CPU: 1 PID: 9495 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 829.606955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.616309] Call Trace: [ 829.618911] dump_stack+0x13e/0x194 [ 829.622552] should_fail.cold+0x10a/0x14b [ 829.626722] should_failslab+0xd6/0x130 [ 829.630705] kmem_cache_alloc_trace+0x2db/0x7b0 [ 829.635384] ? __lock_is_held+0xad/0x140 [ 829.639447] alloc_pipe_info+0xaa/0x380 [ 829.643425] splice_direct_to_actor+0x581/0x730 [ 829.648096] ? avc_policy_seqno+0x5/0x10 [ 829.652159] ? generic_pipe_buf_nosteal+0x10/0x10 [ 829.657008] ? do_splice_to+0x150/0x150 [ 829.660989] ? rw_verify_area+0xe1/0x2a0 [ 829.665054] do_splice_direct+0x164/0x210 [ 829.669220] ? splice_direct_to_actor+0x730/0x730 [ 829.674070] ? rcu_read_lock_sched_held+0x10a/0x130 [ 829.679089] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 829.683848] do_sendfile+0x469/0xaf0 [ 829.687574] ? do_compat_pwritev64+0x140/0x140 [ 829.692165] SyS_sendfile64+0x9b/0x110 [ 829.696050] ? SyS_sendfile+0x130/0x130 [ 829.700015] ? do_syscall_64+0x4c/0x640 [ 829.703976] ? SyS_sendfile+0x130/0x130 [ 829.707937] do_syscall_64+0x1d5/0x640 [ 829.711817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 829.716994] RIP: 0033:0x45c4a9 [ 829.720276] RSP: 002b:00007f5674f33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 829.727981] RAX: ffffffffffffffda RBX: 00007f5674f346d4 RCX: 000000000045c4a9 14:01:42 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0xfffffffffffffffe, 0x12) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200800, 0x0) 14:01:42 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) [ 829.735236] RDX: 00000000200001c0 RSI: 0000000000000008 RDI: 0000000000000008 [ 829.742490] RBP: 000000000076c1a0 R08: 0000000000000000 R09: 0000000000000000 [ 829.749743] R10: 00008080fffffffe R11: 0000000000000246 R12: 0000000000000009 [ 829.756995] R13: 00000000000008d1 R14: 00000000004cb3b0 R15: 0000000000000000 [ 830.221721] FAT-fs (loop4): invalid media value (0x00) [ 830.227137] FAT-fs (loop4): Can't find a valid FAT filesystem [ 830.344857] sp1: Synchronizing with TNC 14:01:42 executing program 1 (fault-call:34 fault-nth:1): r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:01:43 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) 14:01:43 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r11, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 14:01:43 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0xfffffffffffffffe, 0x12) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180), 0x0) [ 831.021566] sp1: Synchronizing with TNC [ 831.205913] FAT-fs (loop4): invalid media value (0x00) [ 831.211289] FAT-fs (loop4): Can't find a valid FAT filesystem 14:01:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0xfffffffffffffffe, 0x12) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200800, 0x0) [ 831.254791] FAULT_INJECTION: forcing a failure. [ 831.254791] name failslab, interval 1, probability 0, space 0, times 0 [ 831.266221] CPU: 0 PID: 9560 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 831.274283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.283647] Call Trace: [ 831.286240] dump_stack+0x13e/0x194 [ 831.289882] should_fail.cold+0x10a/0x14b [ 831.294038] should_failslab+0xd6/0x130 [ 831.298020] __kmalloc+0x2e9/0x7c0 [ 831.301653] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 831.306506] ? alloc_pipe_info+0x156/0x380 [ 831.310754] ? __lock_is_held+0xad/0x140 [ 831.314834] alloc_pipe_info+0x156/0x380 [ 831.318918] splice_direct_to_actor+0x581/0x730 [ 831.323593] ? avc_policy_seqno+0x5/0x10 [ 831.327654] ? generic_pipe_buf_nosteal+0x10/0x10 [ 831.332504] ? do_splice_to+0x150/0x150 [ 831.336481] ? rw_verify_area+0xe1/0x2a0 [ 831.340545] do_splice_direct+0x164/0x210 [ 831.344698] ? splice_direct_to_actor+0x730/0x730 [ 831.349556] ? rcu_read_lock_sched_held+0x10a/0x130 [ 831.354577] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 831.359341] do_sendfile+0x469/0xaf0 [ 831.363068] ? do_compat_pwritev64+0x140/0x140 [ 831.367660] SyS_sendfile64+0x9b/0x110 [ 831.371550] ? SyS_sendfile+0x130/0x130 [ 831.375533] ? do_syscall_64+0x4c/0x640 [ 831.379509] ? SyS_sendfile+0x130/0x130 [ 831.383489] do_syscall_64+0x1d5/0x640 [ 831.387383] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 831.392574] RIP: 0033:0x45c4a9 [ 831.395762] RSP: 002b:00007f5674f96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 831.403479] RAX: ffffffffffffffda RBX: 00007f5674f976d4 RCX: 000000000045c4a9 [ 831.410786] RDX: 00000000200001c0 RSI: 0000000000000007 RDI: 0000000000000007 [ 831.419015] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 831.426303] R10: 00008080fffffffe R11: 0000000000000246 R12: 0000000000000008 [ 831.426308] R13: 00000000000008d1 R14: 00000000004cb3b0 R15: 0000000000000001 14:01:44 executing program 1 (fault-call:34 fault-nth:2): r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x30}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$unlink(0x9, r8, r7) r9 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r8) keyctl$read(0xb, r9, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r9) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r11, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r12 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r13, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r13, r13, &(0x7f00000001c0), 0x8080fffffffe) 14:01:44 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="270000000c060108000000000000000000000008050001000f0000000900020073797a320000000005000100070000009946a6170d3cc375bd82f8a8c7928e256134a630141757a9f1b1a5ce51a5419a0e2d442b1929bf1781fc0f09f65e3a7613e9e5fd3cc34f0b007cf75d2eb7dcac0500d0a9ddba844246c0b25e5842"], 0x1}, 0x1, 0x0, 0x0, 0x20000811}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$unlink(0x9, r7, r6) r8 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffff9, r7) keyctl$read(0xb, r8, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, r8) r9 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340), 0x0, r8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000280)=[{&(0x7f00000001c0)="bab7ad88edbf289586", 0x9}], 0x1, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r10, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000180)={{0x0, 0x0, @descriptor="2929ce6eb7c981de"}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r12, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0], 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r12, r12, &(0x7f00000001c0), 0x8080fffffffe) [ 831.881105] ================================================================== [ 831.881141] BUG: KASAN: use-after-free in con_shutdown+0x7f/0x90 [ 831.881149] Write of size 8 at addr ffff88805ba7f488 by task syz-executor.3/9549 [ 831.881151] [ 831.881162] CPU: 1 PID: 9549 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 831.881168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.881172] Call Trace: [ 831.881187] dump_stack+0x13e/0x194 [ 831.881200] ? con_shutdown+0x7f/0x90 [ 831.881212] print_address_description.cold+0x7c/0x1e2 [ 831.881223] ? con_shutdown+0x7f/0x90 [ 831.881233] kasan_report.cold+0xa9/0x2ae [ 831.881242] ? set_palette+0x130/0x130 [ 831.881252] con_shutdown+0x7f/0x90 [ 831.881262] release_tty+0xb6/0x7a0 [ 831.881274] tty_release_struct+0x37/0x50 [ 831.881283] tty_release+0xaa6/0xd60 [ 831.881299] ? tty_release_struct+0x50/0x50 [ 831.881307] __fput+0x25f/0x790 [ 831.881324] task_work_run+0x113/0x190 [ 831.881338] get_signal+0x187f/0x1ca0 [ 831.881349] ? tty_vhangup+0x30/0x30 [ 831.881361] ? trace_hardirqs_on+0x10/0x10 [ 831.881373] do_signal+0x7c/0x1690 [ 831.881387] ? setup_sigcontext+0x820/0x820 [ 831.881397] ? tty_vhangup+0x30/0x30 [ 831.881408] ? do_vfs_ioctl+0xe2/0xfe0 [ 831.881418] ? selinux_file_mprotect+0x5c0/0x5c0 [ 831.881429] ? ioctl_preallocate+0x1a0/0x1a0 [ 831.881440] ? check_preemption_disabled+0x35/0x240 [ 831.881451] ? kick_process+0xe4/0x170 [ 831.881473] ? task_work_add+0x87/0xe0 [ 831.881485] ? exit_to_usermode_loop+0x41/0x220 [ 831.881500] exit_to_usermode_loop+0x159/0x220 [ 831.881508] ? SyS_ioctl+0x5c/0xb0 [ 831.881520] do_syscall_64+0x4a3/0x640 [ 831.881536] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 831.881543] RIP: 0033:0x45c4a9 [ 831.881549] RSP: 002b:00007fc8f1d9bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 831.881559] RAX: 0000000000000000 RBX: 00007fc8f1d9c6d4 RCX: 000000000045c4a9 [ 831.881565] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000003 [ 831.881570] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 831.881576] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 831.881582] R13: 0000000000000583 R14: 00000000004c7ddd R15: 000000000076bf2c [ 831.881596] [ 831.881601] Allocated by task 382: [ 831.881608] save_stack+0x32/0xa0 [ 831.881615] kasan_kmalloc+0xbf/0xe0 [ 831.881622] kmem_cache_alloc_trace+0x14d/0x7b0 [ 831.881631] vc_allocate+0x142/0x550 [ 831.881638] con_install+0x4f/0x3e0 [ 831.881645] tty_init_dev+0xe1/0x3a0 [ 831.881652] tty_open+0x410/0x9c0 [ 831.881660] chrdev_open+0x1fc/0x540 [ 831.881668] do_dentry_open+0x732/0xe90 [ 831.881676] vfs_open+0x105/0x220 [ 831.881683] path_openat+0x8ca/0x3c50 [ 831.881690] do_filp_open+0x18e/0x250 [ 831.881698] do_sys_open+0x29d/0x3f0 [ 831.881706] do_syscall_64+0x1d5/0x640 [ 831.881713] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 831.881716] [ 831.881720] Freed by task 9587: [ 831.881727] save_stack+0x32/0xa0 [ 831.881734] kasan_slab_free+0x75/0xc0 [ 831.881740] kfree+0xcb/0x260 [ 831.881750] vt_disallocate_all+0x25c/0x340 [ 831.881756] vt_ioctl+0x6e3/0x1f00 [ 831.881763] tty_ioctl+0x6c5/0x1220 [ 831.881770] do_vfs_ioctl+0x75a/0xfe0 [ 831.881778] SyS_ioctl+0x7f/0xb0 [ 831.881785] do_syscall_64+0x1d5/0x640 [ 831.881792] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 831.881795] [ 831.881802] The buggy address belongs to the object at ffff88805ba7f380 [ 831.881802] which belongs to the cache kmalloc-2048 of size 2048 [ 831.881808] The buggy address is located 264 bytes inside of [ 831.881808] 2048-byte region [ffff88805ba7f380, ffff88805ba7fb80) [ 831.881812] The buggy address belongs to the page: [ 831.881819] page:ffffea00016e9f80 count:1 mapcount:0 mapping:ffff88805ba7e280 index:0x0 compound_mapcount: 0 [ 831.881831] flags: 0xfffe0000008100(slab|head) [ 831.881842] raw: 00fffe0000008100 ffff88805ba7e280 0000000000000000 0000000100000003 [ 831.881852] raw: ffffea00026ce2a0 ffffea0002407320 ffff88812fe56c40 0000000000000000 [ 831.881856] page dumped because: kasan: bad access detected [ 831.881858] [ 831.881862] Memory state around the buggy address: [ 831.881869] ffff88805ba7f380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 831.881875] ffff88805ba7f400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 831.881882] >ffff88805ba7f480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 831.881886] ^ [ 831.881892] ffff88805ba7f500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 831.881899] ffff88805ba7f580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 831.881902] ================================================================== [ 831.881905] Disabling lock debugging due to kernel taint [ 831.882550] Kernel panic - not syncing: panic_on_warn set ... [ 831.882550] [ 831.882559] CPU: 1 PID: 9549 Comm: syz-executor.3 Tainted: G B 4.14.172-syzkaller #0 [ 831.882564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.882567] Call Trace: [ 831.882579] dump_stack+0x13e/0x194 [ 831.882589] panic+0x1f9/0x42d [ 831.882596] ? add_taint.cold+0x16/0x16 [ 831.882605] ? preempt_schedule_common+0x4a/0xc0 [ 831.882613] ? con_shutdown+0x7f/0x90 [ 831.882622] ? ___preempt_schedule+0x16/0x18 [ 831.882632] ? con_shutdown+0x7f/0x90 [ 831.882641] kasan_end_report+0x43/0x49 [ 831.882649] kasan_report.cold+0x12f/0x2ae [ 831.882657] ? set_palette+0x130/0x130 [ 831.882665] con_shutdown+0x7f/0x90 [ 831.882673] release_tty+0xb6/0x7a0 [ 831.882682] tty_release_struct+0x37/0x50 [ 831.882690] tty_release+0xaa6/0xd60 [ 831.882700] ? tty_release_struct+0x50/0x50 [ 831.882707] __fput+0x25f/0x790 [ 831.882719] task_work_run+0x113/0x190 [ 831.882729] get_signal+0x187f/0x1ca0 [ 831.882738] ? tty_vhangup+0x30/0x30 [ 831.882749] ? trace_hardirqs_on+0x10/0x10 [ 831.882758] do_signal+0x7c/0x1690 [ 831.882767] ? setup_sigcontext+0x820/0x820 [ 831.882775] ? tty_vhangup+0x30/0x30 [ 831.882785] ? do_vfs_ioctl+0xe2/0xfe0 [ 831.882794] ? selinux_file_mprotect+0x5c0/0x5c0 [ 831.882802] ? ioctl_preallocate+0x1a0/0x1a0 [ 831.882811] ? check_preemption_disabled+0x35/0x240 [ 831.882820] ? kick_process+0xe4/0x170 [ 831.882828] ? task_work_add+0x87/0xe0 [ 831.882836] ? exit_to_usermode_loop+0x41/0x220 [ 831.882846] exit_to_usermode_loop+0x159/0x220 [ 831.882853] ? SyS_ioctl+0x5c/0xb0 [ 831.882863] do_syscall_64+0x4a3/0x640 [ 831.882875] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 831.882880] RIP: 0033:0x45c4a9 [ 831.882885] RSP: 002b:00007fc8f1d9bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 831.882892] RAX: 0000000000000000 RBX: 00007fc8f1d9c6d4 RCX: 000000000045c4a9 [ 831.882897] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000003 [ 831.882901] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 831.882905] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 831.882910] R13: 0000000000000583 R14: 00000000004c7ddd R15: 000000000076bf2c [ 831.884394] Kernel Offset: disabled [ 832.545830] Rebooting in 86400 seconds..