, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:38 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) setreuid(r2, r0) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x80000001, 0x400) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000002c0)={0x10000, 0x2, 0x100000001, 0x0, 0x0, [], [], [], 0x3, 0x4c9}) geteuid() setreuid(0x0, 0x0) gettid() add_key(&(0x7f0000000400)='cifs.idmap\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="843505c7140d313c18a6387ebe6676d67c70281ffa8f211850da81be0a0e3200eac07b3c4456bc6d15a8786fcbe988351733475081146f05e5b0dc1e3326ba64c42fdc8de548d02b33af5307534ed9d768fe58555d090311ba009495e8be1e1b2d96023889ec102d81e229fefa99b5152c5d1c98e8c85cf3ef0a6056b86157e8a611f31306d44712fdcdc6a8de02c5b740208a54414278287909ddccf7bf60abfe1818249cb24570854d17896c442af1d50946568c2d275ec395391902df5bf34b01389691b021", 0xc7, 0xfffffffffffffff9) r4 = request_key(&(0x7f0000000580)='rxrpc_s\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='syz', 0xfffffffffffffffc) ioctl$VIDIOC_G_INPUT(r3, 0x80045626, &(0x7f0000000640)) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffe02, r4) keyctl$chown(0x4, r5, r0, r1) 08:15:38 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x2) 08:15:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) [ 713.573097][ T2632] input: syz0 as /devices/virtual/input/input654 08:15:39 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x28800, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000040)="411a8ad371ff759334e63346966527b212a49f16edee9c8acbcf03e73ebe7ca00f50fa13f8b3c9a4de3da80e700ab53073ba5fb86f81a91b74b3b02e405dd4f0ef335b52acd451b56a34f770fe5d2954d98f0ca76cad4da763012f3c21652a46df52b42ebc94d9b1014f1a78b5224c28208b1dccfefb508c8fcf2704addb942854af64a09556dfa3", 0x88) setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:15:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) 08:15:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x2) 08:15:39 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x15) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x101) setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:15:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:39 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000040)='user\x00'}, 0x30) ptrace$setsig(0x4203, r2, 0x8, &(0x7f00000000c0)={0x40, 0x6, 0x10000}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r3, 0xae03, 0x5) 08:15:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) 08:15:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:39 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x20201, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000040)=0x6) [ 714.768283][ T3000] input: syz0 as /devices/virtual/input/input656 08:15:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) 08:15:40 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) 08:15:40 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:15:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:40 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000040)) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:15:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:40 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) 08:15:40 executing program 0: setreuid(0x0, 0xee00) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x9) r1 = geteuid() setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = open(&(0x7f0000000000)='./file0\x00', 0x200280, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000040)=0x101, 0x4) r4 = getgid() keyctl$chown(0x4, r2, r1, r4) creat(&(0x7f0000000100)='./file0\x00', 0x8) faccessat(r3, &(0x7f00000001c0)='./file0\x00', 0x2, 0x200) 08:15:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:41 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = syz_open_dev$midi(&(0x7f00000008c0)='/dev/midi#\x00', 0x4, 0x440) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000900)) setreuid(0x0, 0x0) r2 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x2000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f00000001c0)={{0x8, 0x7}, 'port1\x00', 0x10, 0x20000, 0xc8, 0x52af, 0x3, 0x9, 0x7ff, 0x0, 0x4, 0x6}) pwritev(r4, &(0x7f0000000800)=[{&(0x7f0000000280)="3f5890516196ea0ddb27d376de18c8599bc71396939f5e5d6d657b531fe2c34c245e3614df8938223e3b1abad55a494e1b0eba8ce8ea20eb12e77bb24df8b9a9fb7d8ce748038d7cf1f8a4dda9ba7b1b507ded30879f7605e3e0e73879f2df20430b2adce576a67fd61a53454f38bce7d26ba41c94ccec473a9459976abaa919fc1c25e7d26bcb181914ca97149c67a3b1acc7cd8c52ca49161c986d723ae35df1e63677", 0xa4}, {&(0x7f0000000340)="17725bbcf259f5c2d81e7a4d27485ec206cb15bef2e3ec4d5bab9547b9407a8e1333304e564dded65cc58c8bda5aa5a9350a3532e698d8c1c697cccec57b3335c485ac4ab05ec846667f8625478f03a8fb62655de6f9ea85f11aba4a319b3865d57a37b233854c483b13257fa6949585c43f105db321a72ecc2e64462e7526995cc3c9a2e8a2addc853d88e5deeb78aafc3a80fbbbaf7383c1bf4f308cce306426f92bda6623b39002ca4229f25e9b7ffde1", 0xb2}, {&(0x7f0000000400)="314fa514ee893b9b9fb0b189d462ad13919120cd58fac15f3b78a73a2ce3a1062c9c238e80f929485d2d2aa5055809a04fc49baef0c119ff55c33ff7bffb6df88360c5e0e306a03eefe1d10b9bf8b6e74b6bf3b8359837762386137115ecf7f0a405945fe25bcb73ba276389299e399e6a6d376a74ec20bd5a78698bd0684d03862a6309b64d8f5623b3852a97b1d351a76292db0b7cd08ffdbe1dca550cb02c04", 0xa1}, {&(0x7f00000000c0)="244c088123cdefe5db155691c65e5b8a178df5c63153767c4d2cbfe79048e4708eeb81abfdfbabf9920c9ca8bbc667ca505415", 0x33}, {&(0x7f00000004c0)="d51f2e9b2454e926220a8dc4529338d4b66ad640b056e66fe0b01f6e42cfff1fcad840fef895f67258d05a5a948b8848a95a25b55d0bbafaa840dc011fce3bfd0e1eee4fb5ccf654dd442c8f0fa1e8739be676479e776076eb3f9d3b8511337d193d8d810a5699086e962c7da96103e34031f063d917b3ff7c165ed13727de66e7b5eb833130da2a8b36c45f741decc905e98b683246", 0x96}, {&(0x7f0000000580)="67ca86775f40a66e9e1d8236a4581386348799d4f329259182a09a00629feece15b67e1b1ca9eefd9c462f1f468c8abf83c142f3d1c3afd5902611fe0a21c72d28ae727350dfe6d3bafb9a083a7e13ba071f5f463641c067a9ac9b830dc667a5a9fc1ac5db51a731b62fc5f334817c8dff971f1a90fd075a5acc784c821d308da291b20be297e0cf18cf3426aa416c61fa6b699fdd0764f4440ff2317ee13eae6bf5da0128200e0de86a82697eb2e9c7d7a5223095f5d55ad1e89037577ad2d91acd116dfa1a936fd56671024deae437aa8ecdc7534297a3126967e72d0a290b38d9566f07fd82e021171d050b", 0xed}, {&(0x7f0000000100)="6a9f9a6cd6d88ff0bb179997c2c1faf7e43085", 0x13}, {&(0x7f0000000680)="940432cd2d6f5ee34cef6e60f3cfd58d6a4c74f627238569f3c277f5a09929b7691d507e0e9384c365cfb11c56bc0afe7bf99894fd176ab17f43f41cf9b81757d621ea7d1d01a20fb6260f8379e62e77436ffd58353872a7b57e2ef33f1da0aeaa4b3712fa9f0a3729705cf78c71e98ed6d1c86802169a971458987b68af184f1bd2af677da551d72764b1ee99332faf86c6aa2e25c5", 0x96}, {&(0x7f0000000740)="f67988602fd1317ee14271cfdac2c7c5af3d577685ff24cc089ff4072a244419b3182cbaec022bcaf4886d0ce5207e9ddd66de1fa5a6ced0fd461617c8e9bdca945619d19dc6730c70e31162fddda062f966936de1f850a7dd05d67428bf060f99ef6bbf68a8d4e6aede0acd668d169e3f24734027a723317a7a7a6ba4cfd4ce8b8ca9e6050252a7a8d9f5017ebc8dd88aeff49f029c0df79a0db45825", 0x9d}], 0x9, 0x0) keyctl$chown(0x4, r3, r0, 0x0) 08:15:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, 0xffffffffffffffff) [ 716.094363][ T3559] input: syz0 as /devices/virtual/input/input658 08:15:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:41 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400000, 0x0) r2 = accept$alg(r1, 0x0, 0x0) setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r0, 0x0) r4 = shmget(0x3, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000200)={'team0\x00', r5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000240)={0x401, 0x2, {0x0, 0x0, 0x2, 0x2, 0x8}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 716.459704][ T3810] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:15:42 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) r2 = getpgid(0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000040)={0x0, 0x80000000, r2, 0x0, r0, 0x0, 0x7, 0xfffffffffffffff9}) setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r0, 0x0) [ 716.645901][ T3802] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 716.724084][ T3810] FAT-fs (loop5): Filesystem has been set read-only 08:15:42 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) [ 716.801478][ T3802] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 0) 08:15:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 716.881955][ T3801] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 08:15:42 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@loopback, @in=@local}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in6=@ipv4}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000380)=0xe8) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) fstat(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000500)) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000740)=0xe8) setreuid(r0, r1) r2 = getpgrp(0x0) sched_getparam(r2, &(0x7f0000000000)) r3 = geteuid() setreuid(0x0, 0x0) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r3, 0x0) [ 716.937847][ T4009] input: syz0 as /devices/virtual/input/input660 08:15:42 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, 0xffffffffffffffff) 08:15:42 executing program 0: setreuid(0x0, 0xee00) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x402000, 0x0) r2 = accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom}, [@rose, @default, @remote, @default, @bcast, @bcast, @null]}, &(0x7f0000000140)=0x48, 0x80800) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)={0x3115, 0xb5, 0x2, 0x0, 0x0, [{r1, 0x0, 0x1686da0}, {r2, 0x0, 0x4f9}]}) r3 = geteuid() setreuid(0x0, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r3, 0x0) 08:15:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:42 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x8001, 0x4) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x1, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080)={0xa, 0x4, 0x8001}, 0xa) 08:15:43 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) socketpair(0x10, 0xe, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x470, 0x130, 0x0, 0x388, 0x388, 0x388, 0x388, 0x4, &(0x7f0000000040), {[{{@arp={@remote, @rand_addr=0x9, 0xffffffff, 0xffffffff, @mac=@dev={[], 0x10}, {[0xff, 0xff, 0xff, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0xff, 0xff]}, 0x4, 0x1, 0x8, 0x100000001, 0x9d, 0xfffffffffffffff8, 'bcsh0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x0, 0x2}, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "88b62b522e141478e342b79d3a105045636d8b5f06080da81c5b43e9aa05"}}, {{@arp={@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffff00, 0xff000000, @mac=@remote, {[0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x3, 0x1, 0x0, 0x3, 0x0, 0x3f, 'veth0_to_team\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x10}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0xffffff00, 0x0, @empty, {[0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0xde4, 0x5, 0xfff, 0x1, 0x820, 0x1, 'vlan0\x00', 'ip6gretap0\x00', {}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@local, @dev={0xac, 0x14, 0x14, 0xe}, @local, 0x5, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:15:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, 0xffffffffffffffff) [ 718.233166][ T4395] input: syz0 as /devices/virtual/input/input662 08:15:43 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xe9, 0x10000) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r1, 0x0) 08:15:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(0xffffffffffffffff, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:43 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:15:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(0x0, 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:44 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000100)=0xe8) setreuid(0x0, r0) r1 = geteuid() r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f00000001c0)=0x3) setreuid(0x0, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000380)=""/108) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000200)=""/238) write$UHID_INPUT2(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000067007f127f007ac2dafb82f2eafb06dd30a3b17542d1175144360a5cf8e6b4fe52be80066c110e591342855a971f3267d2f4e926eab31c7e14535211f16daba830b368a609f288952d1bb91b859cefc7b7c4d81a2690622d364541a2c2c2c5c3e9d207c2ab59278b80f79290280574f4f20a09491d06b44210d71a8e22eba2073447b6b92a1f8d9a59312838f1b482fbb607ba9efb475e038c028a576192db0d110630285e47c0acbe86d7726fa36f1d622a98a3a21499bdf762f47909afcebe75865c5b193b9e9c08cbfed2d0487ed70783a5e0c460e2d3820853ab6449a85de69d"], 0x6d) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r1, 0x0) 08:15:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(0x0, 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) [ 719.016703][ T4576] input: syz0 as /devices/virtual/input/input664 08:15:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:44 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) inotify_init() 08:15:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(0xffffffffffffffff, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(0x0, 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:44 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r3, 0x30, 0x0, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) keyctl$chown(0x4, r1, r0, 0x0) 08:15:44 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x4}], r0}, 0x18, 0x2) 08:15:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, 0x0) dup2(r5, r6) [ 719.833518][ T4986] input: syz0 as /devices/virtual/input/input665 08:15:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:45 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) r2 = geteuid() setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) 08:15:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:45 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, r0) r1 = shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmdt(r1) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000240)={0x0, 0x80000, r3}) r6 = socket$key(0xf, 0x3, 0x2) accept$netrom(r3, &(0x7f00000001c0)={{0x3, @null}, [@bcast, @remote, @default, @netrom, @bcast, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x3, 0xffffffffffffff9c}) recvfrom$llc(r3, &(0x7f0000000040)=""/23, 0x17, 0x40000002, &(0x7f0000000280)={0x1a, 0x6, 0x400000008000, 0x10001, 0xf9, 0x7fff, @local}, 0x10) r8 = shmget(0x2, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r8, 0x0) r9 = socket$l2tp(0x18, 0x1, 0x1) r10 = epoll_create1(0x80000) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f00000000c0)=[r5, r6, r7, r9, r10], 0x5) 08:15:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(0xffffffffffffffff, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:46 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r1) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x100, 0x0) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000180)=0x4) keyctl$chown(0x4, r2, r0, 0x0) 08:15:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(0x0, 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:46 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000040)='user\x00', &(0x7f0000000080)='./file0\x00', r2) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r0, 0x0) [ 721.220114][ T5575] input: syz0 as /devices/virtual/input/input667 08:15:46 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) socketpair(0x0, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) sendfile(r2, r3, &(0x7f0000000100)=0x56, 0x906a) keyctl$chown(0x4, r1, r0, 0x0) 08:15:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(0x0, 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, 0xffffffffffffffff, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:47 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = getgid() r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x4) keyctl$chown(0x4, r1, r0, r2) 08:15:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) 08:15:47 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000380)={0xa, @output={0x1000, 0x1, {0x7fff, 0x6}, 0x80000000, 0x9ca}}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x1}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7, 0x6123e8ae, 0xfffffffffffff800}, &(0x7f0000000200)=0x9436, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xffff}}, 0x163) fanotify_init(0x8, 0x8000) 08:15:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(0x0, 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(0xffffffffffffffff, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 722.196163][ T6067] input: syz0 as /devices/virtual/input/input669 [ 722.217295][ T6097] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 722.295718][ T6097] FAT-fs (loop3): Filesystem has been set read-only 08:15:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) [ 722.415846][ T6039] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 08:15:47 executing program 0: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = gettid() socketpair(0x1, 0x80005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xa800, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000002c0)={r4, r6, 0xfff}) setreuid(0x0, 0xee00) r7 = geteuid() r8 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x800) getsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) accept$inet6(r8, 0x0, &(0x7f00000001c0)) setreuid(r7, 0x0) bind$vsock_stream(r6, &(0x7f00000004c0)={0x28, 0x0, 0x2710, @reserved}, 0x10) syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x200, 0x2) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xe8) bind$xdp(r5, &(0x7f0000000440)={0x2c, 0x3, r10, 0x1c, r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xb, 0x100000000000913, 0x1f}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x24040) readahead(r4, 0xfffffffffffffbff, 0x8) 08:15:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:48 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, 0xffffffffffffffff, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, &(0x7f00000000c0)=0x6, 0x4) [ 722.939769][ T6338] input: syz0 as /devices/virtual/input/input670 08:15:48 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getresuid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)=0x0) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) setreuid(r1, r0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xd61, 0x4002) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000300)=0x8001) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040)=0x7fffffff, 0x4) r3 = geteuid() setreuid(0x0, 0x0) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r3, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000340)={0x4d, ""/77}) 08:15:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x6, 0x4) [ 723.267555][ T6489] input: syz0 as /devices/virtual/input/input671 08:15:48 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 723.357976][ T6479] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:15:48 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setresuid(r0, r0, r0) setreuid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff7, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="b5ae99575fce7339677790d859437890a80535c05d43270d4d13b5ed05ab82a0c741e38d3a08785c6fec7e", 0x2b, 0x494de603}, {&(0x7f00000001c0)="6074174f28c7e4fdcb64df91aa31436ff267fc90f04f530df473f67a93055bd029b0923efa14b2603da75a518a5b0bf9d3ac20645191b03549165e75d744fbad11ffd40d3e45a2798c9380f97b99d62aac2e7a97e11ede566724f35e74e202b0d1b27987f59628b2a4439b86b983d5504714105945bff4b220a2e0721445bb2fec55aeb931c14211e5e4f22a3462f342c0327fc9ca25d13ff0c907bc16f8feb4f81135b5bf896ba834aa4e71bfa364afbce9db66fc8ef972", 0xb8, 0x1}], 0x40004, &(0x7f00000002c0)={[{@session={'session', 0x3d, 0x10001}}, {@dir_umask={'dir_umask', 0x3d, 0x7}}, {@quiet='quiet'}, {@gid={'gid', 0x3d, r1}}, {@uid={'uid', 0x3d, r0}}, {@session={'session', 0x3d, 0x1b}}, {@dir_umask={'dir_umask', 0x3d, 0xd338}}, {@dir_umask={'dir_umask', 0x3d, 0x2b9ed8f7}}], [{@fowner_lt={'fowner<', r0}}, {@subj_user={'subj_user', 0x3d, '-.selinuxsystemppp1GPL'}}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}]}) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) [ 723.461447][ T6479] FAT-fs (loop1): Filesystem has been set read-only 08:15:48 executing program 5: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = gettid() socketpair(0x1, 0x80005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xa800, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000002c0)={r4, r6, 0xfff}) setreuid(0x0, 0xee00) r7 = geteuid() r8 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x800) getsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) accept$inet6(r8, 0x0, &(0x7f00000001c0)) setreuid(r7, 0x0) bind$vsock_stream(r6, &(0x7f00000004c0)={0x28, 0x0, 0x2710, @reserved}, 0x10) syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x200, 0x2) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xe8) bind$xdp(r5, &(0x7f0000000440)={0x2c, 0x3, r10, 0x1c, r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xb, 0x100000000000913, 0x1f}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x24040) readahead(r4, 0xfffffffffffffbff, 0x8) 08:15:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x6, 0x4) 08:15:49 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8001, 0x80) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x5452, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{}]}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x7, 0x1, 0x7b22, 0x2, 0x8, 0x2, 0xe, 0x8}}) 08:15:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, 0xffffffffffffffff, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 723.975943][ T6479] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 08:15:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, 0x0, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x6, 0x4) 08:15:49 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000093c0)=[{{&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/66, 0x42}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000280)=""/4096, 0x1000}, 0x3f}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001280)=""/160, 0xa0}, {&(0x7f0000001340)=""/148, 0x94}, {&(0x7f0000001400)=""/172, 0xac}, {&(0x7f00000014c0)=""/95, 0x5f}, {&(0x7f0000001540)=""/213, 0xd5}, {&(0x7f0000001640)=""/6, 0x6}], 0x6, &(0x7f0000001700)=""/252, 0xfc}}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/217, 0xd9}], 0x1}, 0x1}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/128, 0x80}], 0x1, &(0x7f0000001a00)=""/136, 0x88}, 0xffffffff00000001}, {{&(0x7f0000001ac0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001b40)=""/22, 0x16}, {&(0x7f0000001b80)=""/93, 0x5d}, {&(0x7f0000001c00)=""/222, 0xde}, {&(0x7f0000001d00)=""/7, 0x7}, {&(0x7f0000001d40)=""/182, 0xb6}, {&(0x7f0000001e00)=""/244, 0xf4}, {&(0x7f0000001f00)=""/185, 0xb9}, {&(0x7f0000001fc0)}], 0x8, &(0x7f0000002080)=""/146, 0x92}, 0x4}, {{&(0x7f0000002140)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000003500)=[{&(0x7f00000021c0)=""/56, 0x38}, {&(0x7f0000002200)=""/243, 0xf3}, {&(0x7f0000002300)=""/217, 0xd9}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000003400)=""/128, 0x80}, {&(0x7f0000003480)=""/56, 0x38}, {&(0x7f00000034c0)=""/28, 0x1c}], 0x7, &(0x7f0000003580)=""/117, 0x75}, 0x3}, {{&(0x7f0000003600)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003880)=[{&(0x7f0000003680)=""/231, 0xe7}, {&(0x7f0000003780)=""/164, 0xa4}, {&(0x7f0000003840)=""/2, 0x2}], 0x3, &(0x7f00000038c0)=""/97, 0x61}, 0x5}, {{&(0x7f0000003940)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003c80)=[{&(0x7f00000039c0)=""/82, 0x52}, {&(0x7f0000003a40)=""/109, 0x6d}, {&(0x7f0000003ac0)=""/193, 0xc1}, {&(0x7f0000003bc0)=""/158, 0x9e}], 0x4, &(0x7f0000003cc0)=""/210, 0xd2}, 0xc871}, {{&(0x7f0000003dc0)=@sco, 0x80, &(0x7f0000007f00)=[{&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/4096, 0x1000}, {&(0x7f0000005e40)=""/4096, 0x1000}, {&(0x7f0000006e40)=""/152, 0x98}, {&(0x7f0000006f00)=""/4096, 0x1000}], 0x5, &(0x7f0000007f80)=""/160, 0xa0}, 0x400}, {{&(0x7f0000008040)=@rc, 0x80, &(0x7f00000092c0)=[{&(0x7f00000080c0)=""/107, 0x6b}, {&(0x7f0000008140)=""/1, 0x1}, {&(0x7f0000008180)=""/255, 0xff}, {&(0x7f0000008280)=""/4096, 0x1000}, {&(0x7f0000009280)=""/4, 0x4}], 0x5, &(0x7f0000009340)=""/119, 0x77}, 0x100}], 0xa, 0x0, &(0x7f0000009640)) getsockopt$ax25_int(r1, 0x101, 0xf, &(0x7f0000009680), &(0x7f00000096c0)=0x4) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000040)={0x401, 0x18, [0x2, 0x80000000, 0x6, 0xffff, 0x4, 0x7]}) setresuid(r0, r0, r0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r0, 0x0) [ 724.323440][ T6831] input: syz0 as /devices/virtual/input/input672 08:15:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:49 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@ipx, &(0x7f0000000080)=0x80, 0x800) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f00000001c0)=0xed10) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 08:15:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:50 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = epoll_create1(0x80000) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20100, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f00000001c0)="3e67660f3880929225000066b80500000066b9abdc00000f01d966b9800000c00f326635001000000f30f236f0810ede5cfcfff0f6900300360f01b8511b0f57cc9a73ca43006766c7442400fbffffff6766c7442402000000006766c744240600000000670f01142466b92e0900000f32", 0x71}], 0x1, 0x5, &(0x7f0000000240)=[@flags={0x3, 0x3801}, @cstype0={0x4, 0x3}], 0x2) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}, {}], 0x3, 0x100000001, &(0x7f0000000040)={0x4}, 0x8) 08:15:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:50 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x1, 0x4}, {0x118, 0x100}], r0}, 0x18, 0x2) 08:15:50 executing program 5 (fault-call:18 fault-nth:0): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:50 executing program 0: r0 = geteuid() r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0xffffffffffffffc0, 0x2000) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000280)={0x5, 0xfffffffffffffffe, 0x9, 0xfffffffffffffff8, 0x5}) setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r0}, {0x2, 0x1, r0}, {0x2, 0x4, r0}, {0x2, 0x3, r0}, {0x2, 0x6, r0}], {0x4, 0x7}, [{0x8, 0x4, r3}], {0x10, 0x7}, {0x20, 0x2}}, 0x54, 0x1) setfsuid(r0) 08:15:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 725.537077][ T7395] input: syz0 as /devices/virtual/input/input674 08:15:50 executing program 1 (fault-call:5 fault-nth:0): setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:50 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@initdev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r1) r2 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000280)={@remote, r0}, 0x14) r3 = geteuid() setreuid(0x0, 0x0) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r3, 0x0) 08:15:51 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 725.913461][ T7453] FAULT_INJECTION: forcing a failure. [ 725.913461][ T7453] name failslab, interval 1, probability 0, space 0, times 0 08:15:51 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) [ 726.018585][ T7453] CPU: 1 PID: 7453 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #42 [ 726.026533][ T7453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.036608][ T7453] Call Trace: [ 726.039955][ T7453] dump_stack+0x172/0x1f0 [ 726.044311][ T7453] should_fail.cold+0xa/0x15 [ 726.048932][ T7453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 726.054762][ T7453] ? ___might_sleep+0x163/0x280 [ 726.059640][ T7453] __should_failslab+0x121/0x190 [ 726.064699][ T7453] should_failslab+0x9/0x14 [ 726.069227][ T7453] kmem_cache_alloc_trace+0x2ce/0x750 [ 726.074632][ T7453] alloc_pipe_info+0xb9/0x430 [ 726.079352][ T7453] splice_direct_to_actor+0x76b/0x970 [ 726.084755][ T7453] ? common_file_perm+0x238/0x720 [ 726.089804][ T7453] ? generic_pipe_buf_nosteal+0x10/0x10 [ 726.095378][ T7453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.101645][ T7453] ? do_splice_to+0x180/0x180 [ 726.106349][ T7453] ? rw_verify_area+0x126/0x360 [ 726.111225][ T7453] do_splice_direct+0x1da/0x2a0 [ 726.116108][ T7453] ? splice_direct_to_actor+0x970/0x970 [ 726.121689][ T7453] ? rcu_read_lock_sched_held+0x110/0x130 [ 726.127439][ T7453] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 726.132935][ T7453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.139205][ T7453] ? __sb_start_write+0x1ac/0x360 [ 726.144434][ T7453] do_sendfile+0x597/0xd00 [ 726.148883][ T7453] ? do_compat_pwritev64+0x1c0/0x1c0 [ 726.154228][ T7453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.160665][ T7453] ? _copy_from_user+0xdd/0x150 [ 726.165553][ T7453] __x64_sys_sendfile64+0x15a/0x220 [ 726.170781][ T7453] ? __ia32_sys_sendfile+0x230/0x230 [ 726.176098][ T7453] ? do_syscall_64+0x26/0x680 [ 726.180801][ T7453] ? lockdep_hardirqs_on+0x418/0x5d0 [ 726.186114][ T7453] ? trace_hardirqs_on+0x67/0x220 [ 726.191190][ T7453] do_syscall_64+0xfd/0x680 [ 726.195731][ T7453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.201668][ T7453] RIP: 0033:0x459519 [ 726.205582][ T7453] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.225200][ T7453] RSP: 002b:00007ff0de5ebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 726.233629][ T7453] RAX: ffffffffffffffda RBX: 00007ff0de5ebc90 RCX: 0000000000459519 [ 726.241803][ T7453] RDX: 0000000020000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 726.249893][ T7453] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 726.257896][ T7453] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007ff0de5ec6d4 08:15:51 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x101, 0x10000) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x5}}, 0x18) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x20000) fcntl$notify(r3, 0x402, 0x20) [ 726.265905][ T7453] R13: 00000000004c6af0 R14: 00000000004dbd68 R15: 0000000000000004 08:15:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:51 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security/capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) [ 726.412157][ T7535] FAULT_INJECTION: forcing a failure. [ 726.412157][ T7535] name failslab, interval 1, probability 0, space 0, times 0 [ 726.443861][ T7535] CPU: 0 PID: 7535 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #42 [ 726.451788][ T7535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.461892][ T7535] Call Trace: [ 726.465202][ T7535] dump_stack+0x172/0x1f0 [ 726.469555][ T7535] should_fail.cold+0xa/0x15 [ 726.474178][ T7535] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 726.480008][ T7535] ? ___might_sleep+0x163/0x280 [ 726.484970][ T7535] __should_failslab+0x121/0x190 [ 726.489960][ T7535] should_failslab+0x9/0x14 [ 726.494478][ T7535] kmem_cache_alloc+0x2af/0x6f0 [ 726.499348][ T7535] ? kasan_check_write+0x14/0x20 [ 726.504305][ T7535] taskstats_exit+0x6c8/0xcf0 [ 726.510482][ T7535] ? taskstats_user_cmd+0xce0/0xce0 [ 726.515704][ T7535] ? _raw_spin_unlock_irq+0x5e/0x90 [ 726.520952][ T7535] ? acct_collect+0x699/0x860 [ 726.520971][ T7535] do_exit+0x3d4/0x2fa0 [ 726.520993][ T7535] ? get_signal+0x387/0x24b0 [ 726.529946][ T7535] ? find_held_lock+0x35/0x130 [ 726.529965][ T7535] ? mm_update_next_owner+0x640/0x640 [ 726.529986][ T7535] ? kasan_check_write+0x14/0x20 [ 726.549827][ T7535] ? _raw_spin_unlock_irq+0x28/0x90 [ 726.555044][ T7535] ? get_signal+0x387/0x24b0 [ 726.559650][ T7535] ? _raw_spin_unlock_irq+0x28/0x90 [ 726.564874][ T7535] do_group_exit+0x135/0x370 [ 726.569484][ T7535] get_signal+0x471/0x24b0 [ 726.573928][ T7535] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 726.579767][ T7535] do_signal+0x87/0x1900 [ 726.584032][ T7535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.590296][ T7535] ? _random_read.part.0+0x35c/0xbb0 [ 726.595603][ T7535] ? setup_sigcontext+0x7d0/0x7d0 [ 726.600779][ T7535] ? xfer_secondary_pool+0x160/0x160 [ 726.606083][ T7535] ? finish_wait+0x260/0x260 [ 726.610693][ T7535] ? exit_to_usermode_loop+0x43/0x2c0 [ 726.616077][ T7535] ? do_syscall_64+0x58e/0x680 [ 726.620858][ T7535] ? exit_to_usermode_loop+0x43/0x2c0 [ 726.626251][ T7535] ? lockdep_hardirqs_on+0x418/0x5d0 [ 726.631646][ T7535] ? trace_hardirqs_on+0x67/0x220 [ 726.636692][ T7535] exit_to_usermode_loop+0x244/0x2c0 [ 726.642002][ T7535] do_syscall_64+0x58e/0x680 [ 726.646614][ T7535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.652520][ T7535] RIP: 0033:0x459519 [ 726.656437][ T7535] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.676058][ T7535] RSP: 002b:00007f39257a2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000013e [ 726.684510][ T7535] RAX: fffffffffffffe00 RBX: 00007f39257a2c90 RCX: 0000000000459519 [ 726.692527][ T7535] RDX: 0000000000000002 RSI: fffffffffffffe9b RDI: 0000000000000000 [ 726.700515][ T7535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 726.708504][ T7535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f39257a36d4 [ 726.716495][ T7535] R13: 00000000004c0066 R14: 00000000004d2060 R15: 0000000000000004 [ 727.162285][ T7761] input: syz0 as /devices/virtual/input/input676 08:15:52 executing program 5 (fault-call:18 fault-nth:1): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:52 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3ff, 0x4000) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000040)={0x2, 0x1}) keyctl$chown(0x4, r1, r0, 0x0) 08:15:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:52 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capa.ility\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:52 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:15:52 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:52 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capa/ility\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400040, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x9, 0x1, 0x68, 0x1eb, 0x9}, 0xc) getrandom(0x0, 0x149, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 727.628494][ T7984] FAULT_INJECTION: forcing a failure. [ 727.628494][ T7984] name failslab, interval 1, probability 0, space 0, times 0 [ 727.686896][ T7984] CPU: 0 PID: 7984 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #42 [ 727.694837][ T7984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.705171][ T7984] Call Trace: [ 727.708484][ T7984] dump_stack+0x172/0x1f0 [ 727.712867][ T7984] should_fail.cold+0xa/0x15 [ 727.717486][ T7984] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 727.723537][ T7984] ? ___might_sleep+0x163/0x280 [ 727.728419][ T7984] __should_failslab+0x121/0x190 [ 727.733387][ T7984] should_failslab+0x9/0x14 [ 727.737916][ T7984] __kmalloc+0x2d9/0x740 [ 727.737946][ T7984] ? kmem_cache_alloc_trace+0x351/0x750 [ 727.737969][ T7984] ? alloc_pipe_info+0x199/0x430 [ 727.752706][ T7984] alloc_pipe_info+0x199/0x430 [ 727.757495][ T7984] splice_direct_to_actor+0x76b/0x970 [ 727.762904][ T7984] ? common_file_perm+0x238/0x720 [ 727.768069][ T7984] ? generic_pipe_buf_nosteal+0x10/0x10 [ 727.773630][ T7984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.779929][ T7984] ? do_splice_to+0x180/0x180 [ 727.784633][ T7984] ? rw_verify_area+0x126/0x360 [ 727.789510][ T7984] do_splice_direct+0x1da/0x2a0 [ 727.794387][ T7984] ? splice_direct_to_actor+0x970/0x970 [ 727.799969][ T7984] ? rcu_read_lock_sched_held+0x110/0x130 [ 727.805722][ T7984] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 727.811227][ T7984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.817495][ T7984] ? __sb_start_write+0x1ac/0x360 [ 727.822544][ T7984] do_sendfile+0x597/0xd00 [ 727.826994][ T7984] ? do_compat_pwritev64+0x1c0/0x1c0 [ 727.832310][ T7984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.838575][ T7984] ? _copy_from_user+0xdd/0x150 [ 727.843496][ T7984] __x64_sys_sendfile64+0x15a/0x220 [ 727.848750][ T7984] ? __ia32_sys_sendfile+0x230/0x230 [ 727.854057][ T7984] ? do_syscall_64+0x26/0x680 [ 727.858760][ T7984] ? lockdep_hardirqs_on+0x418/0x5d0 [ 727.864153][ T7984] ? trace_hardirqs_on+0x67/0x220 [ 727.869211][ T7984] do_syscall_64+0xfd/0x680 [ 727.873743][ T7984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.879649][ T7984] RIP: 0033:0x459519 [ 727.883561][ T7984] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 727.903181][ T7984] RSP: 002b:00007ff0de5cac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 727.911605][ T7984] RAX: ffffffffffffffda RBX: 00007ff0de5cac90 RCX: 0000000000459519 [ 727.919591][ T7984] RDX: 0000000020000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 727.927603][ T7984] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 08:15:53 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setreuid(0x0, r0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) [ 727.935597][ T7984] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007ff0de5cb6d4 [ 727.943578][ T7984] R13: 00000000004c6af0 R14: 00000000004dbd68 R15: 0000000000000009 08:15:53 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0xc78b945cc64ef41d, 0x2d) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000329bdfbdfd74aa87212d80c22f2295507024a6c91a9a601000000721c00"/42], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') ioctl$TIOCLINUX7(r4, 0x541c, &(0x7f0000000040)={0x7, 0x135}) 08:15:53 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x02', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000000c0)={0x1000, 0x9, 0x1}) 08:15:53 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) open_by_handle_at(r2, &(0x7f0000000080)={0x67, 0x8, "a354654aa5637968517d2288e223526719dee84eb8cf4929e71319edf1c72418563714e037a929919a4f000d6c8117d2f6c13004bec8ee59c7201ce8bd00e81099482763b4c12f0bd4eafada55e3504c2bb1e8a889c249733dc16b06dffba3"}, 0x200000) keyctl$get_persistent(0x16, r0, r1) setreuid(0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x101, 0x2}) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r0, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x217}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000380)={r6, 0x1}, 0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x7fff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000240)={r7, 0x0, 0xffff}, 0x8) 08:15:53 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x10000, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x100, 0x1, 0x8, 0x1, 0xc, 0x7fffffff, 0x0, 0x800, 0x0, 0x6, 0x5, 0x200}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r2 = dup3(r0, r0, 0x80010) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000001580)={@broadcast, @initdev, 0x0}, &(0x7f00000015c0)=0xc) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x3, 0x1f, 0x1ff, 0x5, 0x0, 0x3, 0x600, 0x5, 0x0, 0xe29, 0x2, 0x8, 0x80, 0x9, 0x101, 0x4, 0x6, 0x0, 0x364, 0x800, 0x3, 0x1, 0x90, 0x7f, 0x80000000, 0x1, 0x8, 0x9, 0x5, 0x80000000, 0x919, 0x9828, 0x3, 0x100000000, 0x2, 0x9, 0x0, 0x2, 0x4, @perf_config_ext={0x8}, 0x8620, 0xfffffffffffffe00, 0x9, 0x7, 0x0, 0x7, 0x8001}, r1, 0x4, 0xffffffffffffff9c, 0xb) sendmsg$FOU_CMD_GET(r2, &(0x7f00000016c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r3, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) r6 = dup2(r5, r1) connect$nfc_llcp(r6, &(0x7f0000000180)={0x27, 0x1, 0x2, 0x3, 0x100000000, 0xffffffffffff5035, "307c2fb5f346548a43f434f0287aeeb24a387ba0da11d9e1cf6a515e99c4e4658c75f9c8b98cdf01a75288c18826db4ccb6a65ef4c5a8eb9a242ef69be629e", 0x37}, 0x60) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) bind$packet(r6, &(0x7f0000000280)={0x11, 0x1f, r4, 0x1, 0x5}, 0x14) 08:15:54 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\xee', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:54 executing program 0: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) [ 728.734569][ T8431] input: syz0 as /devices/virtual/input/input678 08:15:54 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, r0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000040)=""/70) keyctl$chown(0x4, r1, r0, 0x0) 08:15:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x4000, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000100), &(0x7f0000000140)=0xe, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x1, 0x9ae, 0x4e00000000000000, 0x200, 0x1f, 0x9}) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 729.108878][ T8426] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 729.158341][ T8426] FAT-fs (loop5): Filesystem has been set read-only 08:15:54 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x15, r0, 0x3) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x11) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000008, 0x50, r0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x44501, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000040)) setreuid(0x0, 0xee00) r2 = geteuid() setreuid(0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) setreuid(r2, r2) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000001c0)={{0x5e, @rand_addr=0x8, 0x4e21, 0x0, 'none\x00', 0x30, 0x2, 0x20}, {@loopback, 0x4e21, 0x10004, 0x1, 0xffffffff, 0x80000001}}, 0x44) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f00000000c0)={{0xb1, 0xe9}, {0x9, 0x3ff}, 0x9, 0x4, 0x2}) [ 729.329628][ T8400] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 729.449488][ T8400] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 729.494732][ T8400] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 729.566980][ T8400] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 729.622213][ T8305] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 729.698929][ T8821] input: syz0 as /devices/virtual/input/input679 08:15:55 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x2, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:55 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:55 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:55 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xf2f, 0x80000) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000100), &(0x7f00000001c0)=0x4) setreuid(0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000480)={'mangle\x00'}, &(0x7f0000000500)=0x54) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20ncci\x00', 0x400401, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000002c0)=0xfffffffffffffffb) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000200)={'teql0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r3, r0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000240)=0x1) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x208000) getsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) accept(r4, &(0x7f0000000300)=@sco, &(0x7f0000000380)=0x80) accept4$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14, 0x800) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000440)=r5) 08:15:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:55 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000000)='syz', 0xffffffffffffffff}, 0x30) move_pages(r1, 0x8, &(0x7f0000000080)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000fec000/0x3000)=nil], &(0x7f00000000c0)=[0x7ff, 0x13], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x2) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:15:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x99d, 0x8, 0x1, 0x39, 0x9, 0x2, 0x5, 0x8, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x80000000004, 0x3}, 0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:55 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:55 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa083, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:15:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000180)=""/189) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:56 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000240)) setreuid(r0, r0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000001c0)={0x1, 0x0, [0x7, 0x6ef, 0x0, 0x3ff, 0x4, 0x2, 0x7fffffff, 0xff]}) r2 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="8e6fb7b2978a6e54dfe3f9960b6fb456e216bd1cef42ab740de696dc96bbf6e0bf2072935f141d388d143765f0ceaf2428c6ccab9547a363285ecfa22ba6e1b5be46fe3c5dfd95ef881e5e6250829cd74790c95772b089", 0x57, 0xfffffffffffffffb) getsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f00000002c0)=""/134, &(0x7f0000000380)=0x86) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xfffffffffffffff8}, &(0x7f0000000400)=0x8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000440)={0x0, 0x0, 0x8, 0x2, r4}, 0x10) keyctl$chown(0x4, r3, r0, 0x0) [ 730.712542][ T9153] input: syz0 as /devices/virtual/input/input681 08:15:56 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:56 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x3, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:56 executing program 0: r0 = getuid() r1 = getuid() setreuid(r0, r1) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="542024d3a72ac34d5d63db9573091a884887ebf4d91902d5476025746b4aa434b06c72032b1578d7cb1fd2ffd51270f9639112f5db2ff01550dba9866b0f4fa7dde034c22c1ab67e9973a1c82e8d0a5996e5cc93c53a0ff11908af37f08ec9e73cea13dbdc5d0dd00e79272366ab63163fe2465f2c28d6f9b0878c4f486864a561b5f6749c4f6e42f61324252141e0193a0465a82178d831d2c02dfd2e72edeef89b58061ff5f3c9ba0505ca9e39837e1528f41f", 0xb4, 0x6}], 0x0, &(0x7f0000000200)={[{@locktable={'locktable', 0x3d, 'user\x00'}}, {@data_writeback='data=writeback'}, {@hostdata={'hostdata', 0x3d, 'user\x00'}}, {@noquota='noquota'}, {@locktable={'locktable'}}, {@errors_withdraw='errors=withdraw'}, {@meta='meta'}, {@norecovery='norecovery'}, {@nosuiddir='nosuiddir'}], [{@context={'context', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, 'vmnet0*'}}, {@smackfsroot={'smackfsroot'}}]}) r2 = geteuid() setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) 08:15:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 731.121535][ T9501] gfs2: not a GFS2 filesystem 08:15:56 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:56 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffdd4, r1) keyctl$chown(0x4, r2, r0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000100), &(0x7f00000001c0)=0x4) 08:15:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7, 0x4000) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000140)={0x0, 0x200, 0x1}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x80000) accept$unix(r2, 0x0, &(0x7f00000000c0)) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x2, 0x0) fsmount(r3, 0x1, 0xc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:57 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:15:57 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:57 executing program 2: r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) flock(r0, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) getsockname(r0, &(0x7f0000001b00)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000001b80)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001bc0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001cc0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001d00)={{{@in=@empty, @in=@remote, 0x4e22, 0x6b9, 0x4e23, 0x676b, 0x2, 0x80, 0x80, 0x33, r4, r5}, {0x7, 0x1, 0x2, 0x401, 0x3, 0x1ff, 0x1d, 0x3}, {0x5, 0x1000, 0x800}, 0x94, 0x6e6bbf, 0x3, 0x1, 0x3, 0x3}, {{@in6=@mcast1, 0x4d2}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0x1, 0x2, 0x1ff, 0x0, 0xffffffffffff8001, 0x800}}, 0xe8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @local}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000001c0)={r6, 0xfffffffffffffff9}, 0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:57 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') 08:15:57 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x4, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(0x0, 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:57 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x5, &(0x7f0000001400)=[{&(0x7f0000000200)="8075b9e73019a46b7c9d567da4e79c7eac669dcb66e166339e3975e3b5fd49003b5237e28c34581c75ad33c814fd64af3739f9637ef0f444f69b11129f881468f6f493aaaffb63a7c0eb183c8d8320e2374cebff9e29e4a4fdc326d8a55dc2da1658adb5bbeb80d314390facc1e54ab3416127d49330bc2f12bc34e93f0288675e255dcb177b4d8421851ad43d5646fd9be6aaba8157f7947faaac0459bb358f66509d53c724b64c8321f4f2945607b9008cb0b7472139767ff48983a44819f63afb348df1d1", 0xc6, 0x7}, {&(0x7f0000000300)="7d83ee5d139031cb4e9acb04969feb58064fd9d3360d9e71ad1578d0eecb2ac61e5e6a62c594d9", 0x27, 0x1}, {&(0x7f0000000340)="fcaccd0c6d5658bc0c0cf3170eceb1fdce49ccd6959d4b948ce6052b1565e02f687380178d93fd414651d2f1b6db7b1aaaa6e118ff7fd5c6d9abbac163750b92005cd93773a05142a89a6f7fbe2b338624ee7be52139056ebace16a6c6be00cd5f9bb9acf6dbe8d3774fe792494a5f781d4c", 0x72, 0x12e}, {&(0x7f00000003c0)="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", 0x1000, 0x9}, {&(0x7f00000013c0)="61cd11d6fdf110c0d132e8faf9e5d1125f2e5a95fede2be96421b982a6dbf1998c", 0x21, 0x100}], 0x10, &(0x7f0000001480)={[{@quota='quota'}, {@qnoenforce='qnoenforce'}], [{@subj_role={'subj_role', 0x3d, 'vboxnet1%'}}, {@fowner_gt={'fowner>', r0}}]}) setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="f27634a715", 0x5, 0x0) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f00000000c0)='user\x00') 08:15:57 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\xff', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000018912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) 08:15:57 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)) setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f00000001c0)={0x9, @output={0x1000, 0x1, {0x5, 0x3}, 0x10001, 0x8000}}) keyctl$chown(0x4, r3, r0, 0x0) 08:15:58 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\xff', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:58 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) geteuid() 08:15:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) socketpair(0x1f, 0x0, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0xffffffffddb07a12, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8}}, [0x4, 0xe0, 0x3, 0x8, 0xbc9, 0x5, 0x4, 0x0, 0xb5, 0x100000001, 0x0, 0x2, 0x0, 0x3, 0xd7]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x9}, &(0x7f0000000240)=0x8) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 732.858937][T10222] input: syz0 as /devices/virtual/input/input686 08:15:58 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) accept4$netrom(r1, &(0x7f00000015c0)={{0x3, @netrom}, [@bcast, @rose, @bcast, @remote, @null, @netrom, @rose, @rose]}, &(0x7f0000000100)=0x48, 0x80800) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x3ff, 0x8, &(0x7f0000001480)=[{&(0x7f0000000080)="03a465cf2986b636537a726556473620528f96e1e8d8b6494613551d512ea77643219183e977297af416c982ffcc63148f06210203f38e9a3fb3026171afc6c7ace9762f9b5e44a3bd222a66b7400d405aa49ff52f7ea31574e6c3631722572ecafe3dff6f", 0x65, 0x6c}, {&(0x7f00000001c0)="b9964f5d03bc7b013d1fc8c63e6793b99efc13e65b88ad4d584c90a519932b2a67fb83e1ea57fdf5f0b2f04f9cde30d73283cec61e211963b7bdbe07fc7382df5dd4f787ed3f868b2f56c4ede9115b0790dba7dce0e1ed8211cdd055d16ae1d76f8bc670ac212dd265b775660ce0d43f23cf3bce85a30a7f", 0x78, 0x7fffffff}, {&(0x7f0000000240)="04c47fdd2fec2eaa6dd845e7396f03d2a05170a9d0caedfddc66724c644918b41d05a9bb2bfc18a2c60a2846dc57ac293c38cddde7d67250848a600e69c0efd8ec6872752928d8d28d71f9086a12a90ac6f1d6527f48ed80d0922a39b5369c0c825242a398dbb3e2054808a23f3512d7a9a33f9db8a4948e2ae4b1bae2e637b72a4b23ac8fc971a8a96e919df20f211f6c", 0x91, 0x10000}, {&(0x7f0000000300)="29ece00ab5980d978638cb8e834c6857e15005443bab85bab23576e28f6a777d9a421250493f7c9fed57e4f51f14663a50114ca3e6ad7e36c598c43d789cf028f7d5", 0x42, 0xe6}, {&(0x7f0000000100), 0x0, 0x2}, {&(0x7f0000000380)="5411bdc80818bed13304cf8e9fc24e", 0xf}, {&(0x7f00000003c0)="52e0890d11c6b5142a2ea681ac612af77afa2f6b17887aaf8e22707d17ab5f352540b573856fc8f31f034dc8ccd9b974fd809048b2b5a9339c23d6711ac9b9228bbcef2950b3085f9bee15e044991a731aaab8e1b4f8c1fe5b598d7492df1a453ec05aec37e0d662286690a104011026b812cd1e92e93580ba6df8876c332a383a2185915addd53e39cf0c118eadfb4bdda79507f3eb9cbf37149cbe7335af727449a5382bc7f4b1458a5d90d07d45f70db6d329", 0xb4, 0x84}, {&(0x7f0000000480)="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", 0x1000, 0x400}], 0x18040, &(0x7f0000001540)=ANY=[@ANYBLOB='shortname=mixed,euid>', @ANYRESDEC=r0, @ANYBLOB="2c736d61636b6673666c6f6f8b3d75736572002c617569643c", @ANYRESDEC=r0, @ANYBLOB=',\x00']) keyctl$chown(0x4, r2, r0, 0x0) 08:15:58 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x8c', &(0x7f00000000c0)=@v3, 0x18, 0x0) [ 733.359440][T10224] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 733.394081][T10224] FAT-fs (loop5): Filesystem has been set read-only 08:15:58 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x5, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x7, 0x4, 0x6, 0x2}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:15:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(0x0, 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:15:58 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xd66, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000080)={0x5, 0xca}) socketpair(0xd, 0x3, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 08:15:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:15:59 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\xf6', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:59 executing program 0: r0 = geteuid() setreuid(0x0, r0) r1 = geteuid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10000, 0x9f72, 0xf3, 0x1}]}, 0x10) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r1, 0x0) 08:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f00000000c0)=""/246, &(0x7f0000000000)=0xf6) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x66, 0x0, 0x10c) [ 733.819728][T10850] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 733.957307][T10755] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 734.015800][T10850] FAT-fs (loop3): Filesystem has been set read-only [ 734.023519][T10854] input: syz0 as /devices/virtual/input/input688 08:15:59 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) [ 734.069133][T10755] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 734.169099][T10755] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 734.184147][T10755] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:15:59 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000480)={0x0, 0x63}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000500)={r2}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000580)={0x9a6f, 0x6, 0x4, 0x8, 0x56}) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x11) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x2, {0xfd21, 0x10001, "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", 0xba, 0x10001, 0x0, 0x7, 0x3, 0x10001, 0x3f, 0x1}, r4}}, 0x128) socket$inet_sctp(0x2, 0x5, 0x84) ustat(0x4d, &(0x7f0000000540)) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000440)={0x2, 'veth0_to_bridge\x00', 0x2}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, r4, 0x0, 0x1, @in={0x2, 0x4e22, @loopback}}}, 0xa0) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x9, 0x200) ioctl$PIO_SCRNMAP(r5, 0x4b41, &(0x7f00000000c0)="36a6f6caa0b78c9cf47d4ee37aa846d592b7aa7aac16467bc059154e5b839204afa078e80161686819e2e1b5") syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 734.276056][T10740] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 08:15:59 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x26080) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000040)) [ 734.774804][T10889] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:00 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(0x0, 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 734.823276][T10889] FAT-fs (loop5): Filesystem has been set read-only 08:16:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000240)={0x7ff, 0xdc4, 0x0, 0x6, 0x3, 0x0, 0x4, 0x100000000, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)={r3, 0x7fffffff, 0x3, [0x2, 0x3f, 0x5]}, 0xe) r4 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x200, 0x10) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f00000001c0)=0x80000001) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x376, 0xc807c) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r5, 0x800455d1, &(0x7f0000000180)) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000080)) shmget(0x3, 0x2000, 0xa, &(0x7f0000ffb000/0x2000)=nil) 08:16:00 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/keycreate\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) r2 = add_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, r0, r2) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000040)=0x3e9a0aa9, 0x4) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r0, 0x0) 08:16:00 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:00 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:16:00 executing program 0: setreuid(0x0, 0xee00) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)=0x800) r1 = geteuid() setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = socket$pptp(0x18, 0x1, 0x2) fremovexattr(r3, &(0x7f0000000000)=@known='user.syz\x00') keyctl$chown(0x4, r2, r1, 0x0) [ 735.182318][T11297] input: syz0 as /devices/virtual/input/input691 08:16:00 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:00 executing program 2: r0 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$cont(0x1f, r0, 0x6, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:00 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa00c0, 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) stat(&(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010004000000000002000700", @ANYRES32=r0, @ANYBLOB="02000200", @ANYRES32=r0, @ANYBLOB="02000400", @ANYRES32=r0, @ANYBLOB="02000300", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=r0, @ANYBLOB="040006000000000008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="089e5500", @ANYRES32=r5, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="10000400000000002000070000000000"], 0x74, 0x2) r7 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r7, r0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000480)={0x3, {{0xa, 0x4e21, 0xfffffffffffffe00, @empty, 0x6}}, {{0xa, 0x4e24, 0x5c, @dev={0xfe, 0x80, [], 0x15}, 0x9}}}, 0x108) 08:16:00 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:01 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x50, 0x400) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, 0x0) dup2(r4, r5) 08:16:01 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:01 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:16:01 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:01 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0x40045567, &(0x7f0000000380)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}}) keyctl$chown(0x4, r1, r0, 0x0) 08:16:01 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) setpgid(r1, r2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 736.501363][T11897] input: syz0 as /devices/virtual/input/input695 08:16:01 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() sysfs$2(0x2, 0x2, &(0x7f0000000000)=""/121) setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:16:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") signalfd(r0, &(0x7f0000000000)={0x534f}, 0x8) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:02 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in=@empty, @in6=@ipv4={[], [], @initdev}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) setreuid(0x0, r0) r1 = geteuid() setreuid(0x0, 0x0) r2 = getpid() r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x200, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) sched_getparam(r2, &(0x7f0000000000)) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f00000004c0)) 08:16:02 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:02 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000002}, 0x18, 0x0) 08:16:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, 0x0) dup2(r4, r5) 08:16:02 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = shmget$private(0x0, 0x2000, 0x81, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) keyctl$chown(0x4, r1, r0, 0x0) 08:16:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffffffb, 0x210000) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x10084) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:02 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x9, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:02 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)={{{@in=@empty, @in=@multicast2}}, {{@in=@multicast2}}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) setreuid(r1, r0) r2 = geteuid() setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = syz_open_dev$sndpcmp(&(0x7f0000000440)='/dev/snd/pcmC#D#p\x00', 0x3, 0x153180) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000001640)={0x4, 0x0, [{0x1000, 0x2b, &(0x7f0000000480)=""/43}, {0x6000, 0x7d, &(0x7f00000004c0)=""/125}, {0x1000, 0xc6, &(0x7f0000000540)=""/198}, {0x0, 0x1000, &(0x7f0000000640)=""/4096}]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000001700)={0x9c, @tick=0x4, 0x7, {0x3, 0x7}, 0x4, 0x1, 0x1}) keyctl$chown(0x4, r3, r2, 0x0) 08:16:02 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x30000ee}, 0x18, 0x0) 08:16:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x4, {{0x2, 0x4e22, @multicast1}}, 0x1, 0x7, [{{0x2, 0x4, @multicast2}}, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e22, @rand_addr=0x7}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}}]}, 0x410) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000500)=0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 737.677731][T12422] input: syz0 as /devices/virtual/input/input699 08:16:03 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:16:03 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:16:03 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3004000}, 0x18, 0x0) 08:16:03 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x200) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000000c0)={0xb99, 0x100000001, 0x1, 0x5, 0x5c}) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, 0x0) dup2(r4, r5) 08:16:03 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="8cd08c63bd7301ac5fecd5e82753a9322463b26889f29c33f063672f05bc9e2e3593b81e27b58f8d75b85fd873d9", 0x2e, r2) 08:16:03 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x300ee00}, 0x18, 0x0) 08:16:03 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:03 executing program 0: setreuid(0x0, 0xee00) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) r1 = geteuid() r2 = creat(&(0x7f0000000000)='./file0\x00', 0x41) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') ioctl$TIOCSBRK(r2, 0x5427) setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r1, 0x0) 08:16:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x10000, 0x65, 0x80, 0x8, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x400, 0x0) connect$vsock_dgram(r2, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x200000, 0x1c) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f00000001c0)={0x7, 0x800, @value=0x100000001}) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x105000, 0x0) pipe2$9p(&(0x7f0000000140), 0x4800) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000100)) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$VIDIOC_S_AUDOUT(r5, 0x40345632, &(0x7f0000000000)={0x6d, "32d03856affd0076354153d0d228fe89ed0da788c21924bfbfb008868ed8337b", 0x3, 0x1}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r3, 0x408c563e, &(0x7f0000000280)={0x10001, 0x4, 0x18, "f15a00de7a668fc09390d6b008a76bfe7e69505ad556ed74600b9c4019999976fcd8d83fca6d06c91b9c9f5c7961a842e32f0d6237b59218c5f766d5", 0xa, "b94e496148eacc60355b2e783da9236240099e1e9390a937c82a5033dd8ed739348c587f634ba6bba574bbdbea8bf3f1a6ec480c64918d784cbacee7", 0x30}) 08:16:04 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x7000000}, 0x18, 0x0) [ 738.895794][T13147] input: syz0 as /devices/virtual/input/input702 08:16:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = dup2(r0, r0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @empty}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfcf, 0x820d, 0x7, 0x101, r3}, 0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:04 executing program 0: socketpair(0x10, 0x80805, 0xf48e, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x100, 0x5, 0x45e, 0x3}, 0x8) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(r1, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r1, 0x0) 08:16:04 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x40000000}, 0x18, 0x0) 08:16:04 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:04 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r1 = request_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0), 0xfffffffffffffffc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, r0, r2) 08:16:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffff8, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r1, 0x100, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x70308a0e, @media='eth\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x800) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r5) 08:16:04 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3d39, 0x800) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'gretap0\x00', 0x400}) 08:16:05 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xd, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:05 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={@remote={[], 0x0}, 0x2, 'teql0\x00'}) 08:16:05 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x2}]}, 0x18, 0x0) 08:16:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x15, 0x4) 08:16:05 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 740.149772][T13720] input: syz0 as /devices/virtual/input/input705 08:16:05 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ftruncate(r1, 0x3f) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000000)="8a9f3f5be660ab34896d70dfeb8ba3c5b3a46d2469493825a3359240e18f8e897d705e7a3272313447ce1453a392f8d29938891d8b191a717d210ca2ed6f88b5e4d40f1223bf28cceacfe3b1aca39a9fb7981ac8f8ac581d7a989f107e685a5b2e2f299e67a5efdcb860d37313e298", 0x6f) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x304}, "e686e81c941bfb13", "ae9dedd2344f0be4de5389a105daeebf", "73a25a64", "f91efe7764c0a88f"}, 0x28) memfd_create(&(0x7f00000000c0)='wlan1,,x\x00', 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7, 0x100) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f00000001c0)={0x100, 0x3}) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r0, 0x0) 08:16:05 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xee}]}, 0x18, 0x0) 08:16:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r0, 0x40b) r1 = dup3(r0, r0, 0x80000) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000000)='-\x00', &(0x7f00000000c0)='./file0\x00', r0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'rose0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', r2}) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r5) 08:16:06 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000000)={0x0, 0x81, [0x0, 0x9c34, 0x2, 0x7fff, 0xfea], 0x1}) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, r1) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x7, 0x0, 0x10001, 0x13}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x80, r3, 0x10003, 0x5}) 08:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x700, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7f, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:06 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x4000}]}, 0x18, 0x0) [ 741.130218][T14209] input: syz0 as /devices/virtual/input/input707 08:16:06 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x84, 0x0, 0x8}}, 0x14) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="f98b1df66a447fbb9aae0213adaf42c1abe81d6e9e9d5fd1317d8238c6e79a45bd06aa042d7413e7fa2783", 0x2b, 0x3}, {&(0x7f00000001c0)="fbc4ae86bf894e6374d3a936f68c08c550d72e9ac51d0f0c92b953454b169158d85b619049c6cbf6cfc0eae5108f835136ea28947416", 0x36, 0x5}, {&(0x7f0000000200)="8264b3b12e2e196bd7733ea38dbe6fdfa0be78a45fc6ef12ce10cb3728235c6e913468df0dec36d8c1db437ceb0142bc8e4fc90e0c37ae6554061586dc55b75a5935a23bed8a72ecf1d44efdb50d", 0x4e, 0x1}], 0x52060, &(0x7f0000000300)={[{@barrier='barrier'}, {@skip_balance='skip_balance'}, {@flushoncommit='flushoncommit'}, {@check_int='check_int'}, {@space_cache='space_cache'}, {@discard='discard'}, {@fragment_metadata='fragment=metadata'}], [{@fowner_gt={'fowner>', r0}}, {@smackfshat={'smackfshat', 0x3d, 'syz'}}, {@dont_hash='dont_hash'}, {@audit='audit'}]}) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:16:06 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xf, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7fff, &(0x7f0000001180)="11dca5055e0be86a520913d059137ee94daca428cfec70") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) read$FUSE(r1, &(0x7f0000000140), 0x1000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 08:16:06 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xee00}]}, 0x18, 0x0) 08:16:06 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x680, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000040)={0x400, 0x0, 0x1e, "8bd8080697c41955e44f60eeef8b52382a4b929ca678557e98bd527afbfad432ca1e44ed06596ce2a9bfdc4efce91c08f0d2d9e82d5498d94c81804b", 0x3, "3ff6c62e96e055aaaa495861efbffe4ff486d35dcaeed85feae7614b0221b2430c437ca4c6f66141fe80a2c5280ebd4f455148642a4282b6e5386d87", 0x80}) setreuid(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x6, @rand_addr="2402cd6ed26b75ce554462f8009ee2f4", 0x1}], 0x1c) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x10000) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r5) 08:16:07 executing program 0: setreuid(0x0, 0xee00) setreuid(0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$chown(0x4, r1, 0x0, 0x0) 08:16:07 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xee0000}]}, 0x18, 0x0) 08:16:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x10, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:07 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@remote, @in=@remote}}, {{@in6}}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) setreuid(r1, r0) r2 = geteuid() setreuid(0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) 08:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0)={{0x9, 0x7fff}, 0x4}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:07 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(0xffffffffffffffff, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 742.292393][T14701] input: syz0 as /devices/virtual/input/input711 08:16:07 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x1000000}]}, 0x18, 0x0) 08:16:07 executing program 0: setreuid(0x0, 0xee00) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = geteuid() setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r1, 0x0) 08:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x805, 0xc0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:08 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000040)={0xffffffff, 0x1}) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) 08:16:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, 0xffffffffffffffff) 08:16:08 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x2000000}]}, 0x18, 0x0) 08:16:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xffffffffffffffc4, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:08 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4000, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', 'syz'}, 0x8) 08:16:08 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(0xffffffffffffffff, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:08 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x3d, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 743.363716][T15231] input: syz0 as /devices/virtual/input/input713 08:16:08 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x40000000}]}, 0x18, 0x0) 08:16:08 executing program 0: setreuid(0x0, 0xee00) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x20, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="09955f1cfb61b76d5fe4dafa43001011fb364d98510e2f2597a666811f00998e392cb7a09c8e5c52d30e41567aaccef54de6a7071f30b05c69f3bb8ca0c86ddd348fe6ca8123a00234dffdd6b65eba55d755fe47272204b3ddf8131f8c4d47f860778640a7954b3373eaf540232ee0eca64e1585747e4b2e37fb31462f372b53ac", 0x81, 0x6}, {&(0x7f00000001c0)="c078279fe15e67ec76699da4c91a1156fe67d33b7e0668ca8bb001da10342d9c8a3d48075b63293c1f77cf47d72ee4a41c5a1be162456f2b1fcfbb0db50dca", 0x3f, 0x7}], 0x1000, &(0x7f00000002c0)={[{@iocharset={'iocharset', 0x3d, 'cp874'}}, {@errors_continue='errors=continue'}, {@quota='quota'}, {@errors_continue='errors=continue'}, {@discard='discard'}, {@usrquota='usrquota'}, {@gid={'gid', 0x3d, r3}}], [{@seclabel='seclabel'}]}) setreuid(0x0, 0x0) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r1, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000340)=r2) 08:16:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xffffffffffffffff, 0x3}, 0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, 0xffffffffffffffff) 08:16:09 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x8cffffff}]}, 0x18, 0x0) 08:16:09 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:16:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x6, 0x1, 0x0, "48c6a2618a0dcac0c927a00b89d381c931265c6609a36b5743e39fe5501b1099711d624dfc494bf0a70a3d03fced37c78c951060bf6b72f066a820792bf659", 0x29}, 0xfd50) 08:16:09 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x67, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 744.221967][T15646] input: syz0 as /devices/virtual/input/input715 08:16:09 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x100, 0x20) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000001c0)={0x1, 0x0, [{0xb, 0x8, 0xb978, 0x200, 0xffff}]}) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xc400, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x88002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f00000000c0)={r4, 0x7fff, 0x757, r5}) 08:16:09 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xf6ffffff}]}, 0x18, 0x0) [ 744.411070][T15793] Unknown ioctl 21544 08:16:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(0xffffffffffffffff, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:09 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='[\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)="941c558f41b4efa775996e46cc0b1cc7670ac61c5837d8869e434e332450213c660fe0b7fe45a26a873abca67225bf8e24313b9a272cd4f5e41437d36e86cbb791f352581168fa86172eb61d98343d7d6e56bb7e554a1bccd1b920811f71e573336dec7794bfdbaa632dc7345ecf8de9d47a02199602", 0x76, 0xffffffffffffffff) keyctl$link(0x8, r1, r2) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r0, 0x0) 08:16:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x802) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, 0xffffffffffffffff) 08:16:10 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xffffff8c}]}, 0x18, 0x0) 08:16:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @loopback}, 0x2, 0x4, 0x3, 0x2}}, 0x26) 08:16:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5c9, 0x40000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000000c0)=0x6f) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:10 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, 0xffffffffffffffff, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:10 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xfffffff6}]}, 0x18, 0x0) [ 745.440097][T16157] input: syz0 as /devices/virtual/input/input718 08:16:10 executing program 0: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, r1, 0x0) 08:16:10 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x69, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)) 08:16:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0/../file0\x00', 0x0, 0x0) 08:16:11 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xee000000000000}]}, 0x18, 0x0) 08:16:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r1, 0x29, 0x4000000066, 0x0, 0xffffffc5) 08:16:11 executing program 4: poll(&(0x7f0000000100)=[{}, {}], 0x2, 0x81) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000100)=""/111, 0x6f}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) r2 = socket$inet_udplite(0x2, 0x2, 0x88) read(r2, &(0x7f0000000000)=""/108, 0x6c) shutdown(r1, 0x0) 08:16:11 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x100000000000000}]}, 0x18, 0x0) 08:16:11 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, 0xffffffffffffffff, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:11 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r2, 0x29, 0xcf, 0x0, 0x644) 08:16:11 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x200000000000000}]}, 0x18, 0x0) 08:16:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xa2, "1c5d33127c6cbfc30637e9c4ea57fafc773261f9cb0b541f986c7a9976c56f2aef29ed95e8ca4ae939ba20071fdd3642a3d151d8101a89464a4de70271b4c8e5b42e4f1caa69ec4c0f54e7e200d73fe8738118639989a794bb702023821c573d03d18b901384ce69b2861004d1ea25f733906bf82fec12617b31e38aa8d4bf23690f323ef78fdd38fb14a88585b199182bd5e25cf7495598df2c69c0c6d069441c3a"}, &(0x7f0000000000)=0xaa) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000180)=r2, 0x4) [ 746.704909][T16472] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 746.772111][T16472] FAT-fs (loop5): Filesystem has been set read-only 08:16:12 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6b, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:12 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x4000000000000000}]}, 0x18, 0x0) 08:16:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40001000008912, &(0x7f0000000240)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000140)={0x2001, 0x1, 0x0, 0xfffffffffffffffb, 0xffffffffffffffe0}) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000180)='/dev/vcsa#\x00', 0xb) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x2f) 08:16:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0/../file0\x00', 0x0, 0x0) 08:16:14 executing program 4: r0 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206437c25a843090a26275b040016001500154002004c000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb6cde448daa7227c43ab8620000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 08:16:14 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x8cffffff00000000}]}, 0x18, 0x0) 08:16:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x459, 0x0, 0x197) 08:16:14 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, 0xffffffffffffffff, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:14 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6c, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 749.084174][T17446] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 749.092546][T17446] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:14 executing program 4: r0 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206437c25a843090a26275b040016001500154002004c000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb6cde448daa7227c43ab8620000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 08:16:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000100)={{0x8, 0x5}, 0x1}, 0x10) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000000c0)) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000000)={0x0, 0x7fff}) 08:16:14 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0xf6ffffff00000000}]}, 0x18, 0x0) [ 749.423228][T17667] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 749.555892][T17667] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$sock_bt_hci(r1, 0x400448dd, &(0x7f0000000000)="9ea439190a2d9210b30cd5d2ad1250f017cfcb0f127001afa1462db158f37335607abc1802") setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000001180)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x1, {{0x0, 0x1}}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="93d65ffda0e2bcff124ba860b057fa487686e836204c3ff1ec59fc8e66be2d9b4407a7b8137eeff58cdcddb1b2", 0x2d}], 0x1, &(0x7f0000000180)="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", 0x1000, 0x8010}, 0x4000000) 08:16:15 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) 08:16:15 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x2}]}, 0x18, 0x0) 08:16:17 executing program 0: r0 = socket(0x1, 0x1, 0x0) stat(0x0, 0x0) r1 = gettid() setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000280), 0x4) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1020000000016) 08:16:17 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x3bb, 0x20, 0x10001, 0x5, 0x4, 0x1f, 0x81, 0x2, 0x1, 0x4, 0x1}, 0xb) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:17 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6e, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:17 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xee}]}, 0x18, 0x0) 08:16:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) 08:16:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = semget(0x2, 0x0, 0x4) semctl$IPC_RMID(r1, 0x0, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:17 executing program 0: mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_open_dev$midi(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:16:17 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x4000}]}, 0x18, 0x0) 08:16:17 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") delete_module(&(0x7f0000000000)='+keyringmime_type\x00', 0xa00) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:18 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x70, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x1f, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x7c4d257d6852f715, 0x0, 0x0, 0x800e00521) shutdown(r1, 0x0) 08:16:18 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 08:16:18 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xee00}]}, 0x18, 0x0) 08:16:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2001000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000001c0)=0x3b7cd65800000000) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/185, 0xb9}], 0x1) getrandom(0x0, 0xfffffffffffffff2, 0xfffffffffffffffc) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000240)={0x0, 0x80, 0x6, 0xd3, 0x15, 0x5, 0x1ff, 0x7ff, 0x7, 0x4, 0x7fff}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x200000, 0x0) 08:16:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x4000000000000002, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="24000000200007041dfffd946f6105000a0000e81f0000020000080008000400039ca400", 0x24}], 0x1}, 0x0) 08:16:18 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xee0000}]}, 0x18, 0x0) [ 753.302913][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 753.308867][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:16:18 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xffffff2f, 0x6) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:18 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x100100000001, 0x0) gettid() write$P9_RREADLINK(r0, 0x0, 0x0) 08:16:18 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x71, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:19 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x1000000}]}, 0x18, 0x0) [ 753.702877][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 753.708749][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:16:19 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f0000000000)=[{r0, 0xa4}], 0x1, 0x0) poll(&(0x7f0000000580)=[{r0}], 0x1, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x10101, 0x0, 0x0, 0x800e00990) poll(&(0x7f0000000380)=[{r0, 0x4}], 0x1, 0xb6) shutdown(r1, 0x0) 08:16:19 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x100) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x8200) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffa) 08:16:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10008000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48001}, 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:19 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x67, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:19 executing program 4: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000002}, 0x18, 0x0) 08:16:19 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x2000000}]}, 0x18, 0x0) 08:16:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x9, 0x40000) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000280)=0x2a614aff, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x206140, 0x0) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000140)="0971f04fb2fb85e3518734a446929ebbd8588c0599c031ac9188474373af5fff671a87d8c95068d105cf9f9c1f760f9806413424564ab776e8e8e92dbe35bfc55bbf8cd7754295c4b3d0af25bdb9de50a94a40349e666f314281256c8312963396ae04c254ac656f478b93d87d0dea5eb00a5a50a4b4372da5a85f589983bf6466f797965c387cf61856c8a80a22287bf938dc819ba3dab25c402fcfb40a898bc88cf99993f45cbf7e8d5096619833eec1cd31aa091906658360fd95f06f2b67c0c2ff736ea6e98b1170cef541ed41f6dd9870ba4de929a2cb1cad71d2d33371e19b3f36ae7a06639e") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x2100) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0xfffffffffffffffc, 0x6, 0x1, 0x7, 0x1, 0x4, 0x3, 0x44, 0x3, 0x2, 0x4, 0x3}) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:19 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:19 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x73, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:20 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x40000000}]}, 0x18, 0x0) 08:16:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:20 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x8cffffff}]}, 0x18, 0x0) 08:16:20 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f00000000c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x2, 0x9, 0x20a, 0x6, 0x6, 0xfffffffffffffff0, 0x11, 0x4e, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r2, 0xe4}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={r2, 0x6}, &(0x7f0000000280)=0x8) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x8, 0x100) r3 = pkey_alloc(0x0, 0x1) pkey_free(r3) pkey_free(r3) 08:16:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x4, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:20 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xf6ffffff}]}, 0x18, 0x0) 08:16:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0x81986eebad3d4438, 0x12) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 755.784064][T19626] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 755.846978][T19758] input: syz0 as /devices/virtual/input/input733 [ 755.873677][T19626] FAT-fs (loop5): Filesystem has been set read-only 08:16:21 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x75, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:21 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 756.119499][T20012] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:21 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xffffff8c}]}, 0x18, 0x0) [ 756.224877][T20012] FAT-fs (loop4): Filesystem has been set read-only 08:16:21 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000240)) setreuid(r0, r0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000001c0)={0x1, 0x0, [0x7, 0x6ef, 0x0, 0x3ff, 0x4, 0x2, 0x7fffffff, 0xff]}) r2 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="8e6fb7b2978a6e54dfe3f9960b6fb456e216bd1cef42ab740de696dc96bbf6e0bf2072935f141d388d143765f0ceaf2428c6ccab9547a363285ecfa22ba6e1b5be46fe3c5dfd95ef881e5e6250829cd74790c95772b089", 0x57, 0xfffffffffffffffb) getsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f00000002c0)=""/134, &(0x7f0000000380)=0x86) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xfffffffffffffff8}, &(0x7f0000000400)=0x8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000440)={0x0, 0x0, 0x8, 0x2, r4}, 0x10) keyctl$chown(0x4, r3, r0, 0x0) 08:16:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x412200, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f00000000c0)={0x1, 0xda}) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x4, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000100)) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x5) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 756.338433][T20010] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 756.358013][T20010] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 756.382637][T20010] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 756.555638][T20010] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 756.709624][T19997] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF 08:16:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) fstat(r0, &(0x7f00000000c0)) 08:16:22 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xfffffff6}]}, 0x18, 0x0) 08:16:22 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x76, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:22 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xee000000000000}]}, 0x18, 0x0) 08:16:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x600, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'lo\x00', 0x101}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = getpid() tkill(r2, 0x39) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x5, @empty, 0x2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}], 0x2c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x69, 0x0, 0x0) [ 757.380838][T20454] input: syz0 as /devices/virtual/input/input737 08:16:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7fff, 0x4, &(0x7f0000000440)=[{&(0x7f0000000100)="24a7ede4654ce7d9c4a70d3d6560d86ba865134fe0ab8ad3c416bb4c1bfb0e5dd0a37e71d9c3d457b851ac6a0e10cc61356585d53236ae882ce499d7af65eb7c4866367de91340c03a52e9672f7d52ce496190f2c2cce06c693844f6fe76fb0b6b6a9d83f62975dda943984cb8676ca57483bef73b972bdb915d176a3a904b379bc611ea991b48c4a18eaa0f7d72fc33af872f358137bb9a6767c98ff26efe29ed6a967e5ee79107db9f8af21547b3f3f959dd80445726a420ea7e38adf3a3697b122451", 0xc4, 0x45}, {&(0x7f0000000200)="f7aebd4be4549e904ca8a6d81e73bb01b4e6114366930bb005fc896c52e458f19e16cdbfee25737340a1974c8afa63f614034f56304c0fa8b6b0bacdf6357741fedff081228d866acc2346b6264a3063118f4be6455ba7edd011606304d485a3a9c727b3a17b08a292dbe35742ef2ea0a82f27bfba0c09edd38fb03a180f6bbb8a60f09e0f1e1192eea476ecdd7813912020554369e14038e630583dd44ca7f3b52d5fd5678eba25b1eafc6733f432d7c322f578f01768f3772c515fa53a8f95bfeb966f6f1631f92095e6c5d5cdb1bbc39c6c2dabe310263e17e55eee14", 0xde, 0x3f}, {&(0x7f0000000300), 0x0, 0x4}, {&(0x7f0000000340)="6175be5fc7d678c1097084dd1834af52afbc900da290fc6b589abffebac98db8ab7fc53d6353d21c5c8e66957f47d58b0193697976d82fcd87f5b4d2b871ff155eb07a01f0677cb12b664e2ee370d7c9179dfdc28ef084af7a57641a0f97068b4de19b040c629b61a2efa33e83315b14e5ed1cb11b7fe06fa2d1ed59ab25b411c3fa04519ba58dd25028c3ba1e59178e8d2445ea370e2eb08184476229a9ca9baaf7eb4f85978bf4835d79c8681dfa1bdd74698cc9ba57b9c1ecc2baf46ef82168a20113", 0xc4, 0x40}], 0x80, &(0x7f00000004c0)={[{@noinline_data='noinline_data'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x4e}}, {@noheap='noheap'}, {@noheap='noheap'}], [{@context={'context', 0x3d, 'user_u'}}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}, {@dont_appraise='dont_appraise'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x2c6080de4ef799c, 0x65, 0x37, 0x66, 0x63c62f5afafdb82f, 0x74], 0x2d, [0x36, 0x0, 0x67, 0x39], 0x2d, [0x33, 0x66, 0x0, 0x67], 0x2d, [0x7d, 0x33, 0x77, 0x77], 0x2d, [0x63, 0x66, 0x0, 0x75, 0x33, 0x65, 0x35, 0x30]}}}, {@smackfshat={'smackfshat', 0x3d, '/dev/vcsa#\x00'}}]}) 08:16:22 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x78, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:22 executing program 0 (fault-call:18 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:22 executing program 4 (fault-call:4 fault-nth:0): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:23 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x100000000000000}]}, 0x18, 0x0) 08:16:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/19) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x200, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000140)) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 758.010867][T20949] FAULT_INJECTION: forcing a failure. [ 758.010867][T20949] name failslab, interval 1, probability 0, space 0, times 0 [ 758.109232][T20949] CPU: 0 PID: 20949 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 758.117257][T20949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.127327][T20949] Call Trace: [ 758.130652][T20949] dump_stack+0x172/0x1f0 [ 758.135007][T20949] should_fail.cold+0xa/0x15 [ 758.139626][T20949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.145481][T20949] ? ___might_sleep+0x163/0x280 [ 758.150351][T20949] __should_failslab+0x121/0x190 [ 758.151387][T20987] FAULT_INJECTION: forcing a failure. [ 758.151387][T20987] name failslab, interval 1, probability 0, space 0, times 0 [ 758.155310][T20949] should_failslab+0x9/0x14 [ 758.155326][T20949] __kmalloc_track_caller+0x2d5/0x740 [ 758.155346][T20949] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 758.155361][T20949] ? fput_many+0x12c/0x1a0 [ 758.155377][T20949] ? strndup_user+0x77/0xd0 [ 758.155406][T20949] memdup_user+0x26/0xb0 [ 758.197226][T20949] strndup_user+0x77/0xd0 [ 758.201578][T20949] ksys_mount+0x3c/0x150 [ 758.205874][T20949] __x64_sys_mount+0xbe/0x150 [ 758.210574][T20949] do_syscall_64+0xfd/0x680 [ 758.215109][T20949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.221025][T20949] RIP: 0033:0x459519 [ 758.224934][T20949] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.244555][T20949] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 758.252982][T20949] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 758.260977][T20949] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 758.268971][T20949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 758.276965][T20949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 758.284981][T20949] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:23 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x200000000000000}]}, 0x18, 0x0) 08:16:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 758.313406][T21027] input: syz0 as /devices/virtual/input/input741 [ 758.347112][T20987] CPU: 1 PID: 20987 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #42 [ 758.355145][T20987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.365215][T20987] Call Trace: [ 758.368535][T20987] dump_stack+0x172/0x1f0 [ 758.372897][T20987] should_fail.cold+0xa/0x15 [ 758.377511][T20987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.383340][T20987] ? ___might_sleep+0x163/0x280 [ 758.388210][T20987] __should_failslab+0x121/0x190 [ 758.393171][T20987] should_failslab+0x9/0x14 [ 758.397690][T20987] kmem_cache_alloc_trace+0x2ce/0x750 [ 758.403088][T20987] alloc_pipe_info+0xb9/0x430 [ 758.407802][T20987] splice_direct_to_actor+0x76b/0x970 [ 758.413185][T20987] ? common_file_perm+0x238/0x720 [ 758.418232][T20987] ? generic_pipe_buf_nosteal+0x10/0x10 [ 758.423852][T20987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.430122][T20987] ? do_splice_to+0x180/0x180 [ 758.434833][T20987] ? rw_verify_area+0x126/0x360 [ 758.439717][T20987] do_splice_direct+0x1da/0x2a0 [ 758.444586][T20987] ? splice_direct_to_actor+0x970/0x970 [ 758.450151][T20987] ? rcu_read_lock_sched_held+0x110/0x130 [ 758.455886][T20987] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 758.461368][T20987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.467626][T20987] ? __sb_start_write+0x1ac/0x360 [ 758.472675][T20987] do_sendfile+0x597/0xd00 [ 758.477139][T20987] ? do_compat_pwritev64+0x1c0/0x1c0 [ 758.482600][T20987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.488845][T20987] ? _copy_from_user+0xdd/0x150 [ 758.493707][T20987] __x64_sys_sendfile64+0x15a/0x220 [ 758.493725][T20987] ? __ia32_sys_sendfile+0x230/0x230 [ 758.493741][T20987] ? do_syscall_64+0x26/0x680 [ 758.493759][T20987] ? lockdep_hardirqs_on+0x418/0x5d0 [ 758.493780][T20987] ? trace_hardirqs_on+0x67/0x220 [ 758.520221][T20987] do_syscall_64+0xfd/0x680 [ 758.524747][T20987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.530645][T20987] RIP: 0033:0x459519 [ 758.534578][T20987] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.554634][T20987] RSP: 002b:00007f92c78efc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 758.563067][T20987] RAX: ffffffffffffffda RBX: 00007f92c78efc90 RCX: 0000000000459519 [ 758.571047][T20987] RDX: 0000000020000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 758.579026][T20987] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 758.587035][T20987] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f92c78f06d4 [ 758.590018][T21242] FAULT_INJECTION: forcing a failure. [ 758.590018][T21242] name failslab, interval 1, probability 0, space 0, times 0 08:16:23 executing program 4 (fault-call:4 fault-nth:1): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:23 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x4000000000000000}]}, 0x18, 0x0) 08:16:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000180)=[r1], 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e20, @rand_addr=0xffffffff7fffffff}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}], 0x8c) setsockopt$inet6_int(r1, 0x29, 0xb, 0x0, 0x0) [ 758.595016][T20987] R13: 00000000004c6af0 R14: 00000000004dbd68 R15: 0000000000000005 [ 758.660022][T21242] CPU: 0 PID: 21242 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 758.668045][T21242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.678104][T21242] Call Trace: [ 758.681419][T21242] dump_stack+0x172/0x1f0 [ 758.685771][T21242] should_fail.cold+0xa/0x15 [ 758.690380][T21242] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.696215][T21242] ? ___might_sleep+0x163/0x280 [ 758.701093][T21242] __should_failslab+0x121/0x190 [ 758.706138][T21242] should_failslab+0x9/0x14 [ 758.710648][T21242] kmem_cache_alloc+0x2af/0x6f0 [ 758.715508][T21242] ? __might_fault+0x12b/0x1e0 [ 758.715530][T21242] getname_flags+0xd6/0x5b0 [ 758.715552][T21242] user_path_at_empty+0x2f/0x50 [ 758.715572][T21242] do_mount+0x150/0x1c00 [ 758.715595][T21242] ? copy_mount_string+0x40/0x40 [ 758.715613][T21242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.715635][T21242] ? _copy_from_user+0xdd/0x150 [ 758.749960][T21242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.756216][T21242] ? copy_mount_options+0x280/0x3a0 [ 758.761425][T21242] ksys_mount+0xdb/0x150 [ 758.765678][T21242] __x64_sys_mount+0xbe/0x150 [ 758.770363][T21242] do_syscall_64+0xfd/0x680 [ 758.774877][T21242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.780943][T21242] RIP: 0033:0x459519 [ 758.784841][T21242] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.804530][T21242] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 758.812938][T21242] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 758.820906][T21242] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 758.828906][T21242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 758.836878][T21242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 758.844940][T21242] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:24 executing program 4 (fault-call:4 fault-nth:2): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:24 executing program 0 (fault-call:18 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 759.111522][T21030] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 759.161553][T21402] FAULT_INJECTION: forcing a failure. [ 759.161553][T21402] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 759.174794][T21402] CPU: 1 PID: 21402 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 759.174805][T21402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.174811][T21402] Call Trace: [ 759.174844][T21402] dump_stack+0x172/0x1f0 [ 759.200474][T21402] should_fail.cold+0xa/0x15 [ 759.205085][T21402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.210922][T21402] ? mark_held_locks+0xf0/0xf0 [ 759.215704][T21402] should_fail_alloc_page+0x50/0x60 [ 759.220947][T21402] __alloc_pages_nodemask+0x1a1/0x8d0 [ 759.226340][T21402] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 759.231984][T21402] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 759.231999][T21402] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 759.232022][T21402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.247039][T21030] FAT-fs (loop5): Filesystem has been set read-only [ 759.249606][T21402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.249631][T21402] cache_grow_begin+0x9d/0x650 [ 759.249654][T21402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.273053][T21402] kmem_cache_alloc+0x62a/0x6f0 [ 759.277950][T21402] ? __might_fault+0x12b/0x1e0 [ 759.282734][T21402] getname_flags+0xd6/0x5b0 [ 759.287253][T21402] user_path_at_empty+0x2f/0x50 [ 759.287274][T21402] do_mount+0x150/0x1c00 [ 759.287296][T21402] ? copy_mount_string+0x40/0x40 [ 759.301318][T21402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.307568][T21402] ? _copy_from_user+0xdd/0x150 08:16:24 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x79, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 759.312437][T21402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.318746][T21402] ? copy_mount_options+0x280/0x3a0 [ 759.323956][T21402] ksys_mount+0xdb/0x150 [ 759.328209][T21402] __x64_sys_mount+0xbe/0x150 [ 759.332929][T21402] do_syscall_64+0xfd/0x680 [ 759.337452][T21402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.343357][T21402] RIP: 0033:0x459519 [ 759.347261][T21402] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.367055][T21402] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 759.367072][T21402] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 759.367081][T21402] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 759.367090][T21402] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 759.367099][T21402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 08:16:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x67a2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, &(0x7f0000000180)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:24 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x8cffffff00000000}]}, 0x18, 0x0) [ 759.367117][T21402] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:24 executing program 4 (fault-call:4 fault-nth:3): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 759.499350][T21467] FAULT_INJECTION: forcing a failure. [ 759.499350][T21467] name failslab, interval 1, probability 0, space 0, times 0 08:16:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 759.719094][T21582] input: syz0 as /devices/virtual/input/input743 [ 759.776448][T21602] FAULT_INJECTION: forcing a failure. [ 759.776448][T21602] name failslab, interval 1, probability 0, space 0, times 0 [ 759.790862][T21467] CPU: 0 PID: 21467 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #42 [ 759.798908][T21467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.808977][T21467] Call Trace: [ 759.812291][T21467] dump_stack+0x172/0x1f0 [ 759.816652][T21467] should_fail.cold+0xa/0x15 [ 759.821440][T21467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.821474][T21467] ? ___might_sleep+0x163/0x280 [ 759.821497][T21467] __should_failslab+0x121/0x190 [ 759.837418][T21467] should_failslab+0x9/0x14 [ 759.841937][T21467] __kmalloc+0x2d9/0x740 [ 759.846188][T21467] ? kmem_cache_alloc_trace+0x351/0x750 [ 759.851747][T21467] ? alloc_pipe_info+0x199/0x430 [ 759.856698][T21467] alloc_pipe_info+0x199/0x430 [ 759.861483][T21467] splice_direct_to_actor+0x76b/0x970 [ 759.866868][T21467] ? common_file_perm+0x238/0x720 [ 759.871918][T21467] ? generic_pipe_buf_nosteal+0x10/0x10 [ 759.877485][T21467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.883737][T21467] ? do_splice_to+0x180/0x180 [ 759.888434][T21467] ? rw_verify_area+0x126/0x360 [ 759.893309][T21467] do_splice_direct+0x1da/0x2a0 [ 759.898179][T21467] ? splice_direct_to_actor+0x970/0x970 [ 759.903745][T21467] ? rcu_read_lock_sched_held+0x110/0x130 [ 759.909523][T21467] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 759.914996][T21467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.921251][T21467] ? __sb_start_write+0x1ac/0x360 [ 759.926294][T21467] do_sendfile+0x597/0xd00 [ 759.930731][T21467] ? do_compat_pwritev64+0x1c0/0x1c0 [ 759.936038][T21467] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.942290][T21467] ? _copy_from_user+0xdd/0x150 [ 759.947155][T21467] __x64_sys_sendfile64+0x15a/0x220 [ 759.952800][T21467] ? __ia32_sys_sendfile+0x230/0x230 [ 759.958097][T21467] ? do_syscall_64+0x26/0x680 [ 759.962802][T21467] ? lockdep_hardirqs_on+0x418/0x5d0 [ 759.968110][T21467] ? trace_hardirqs_on+0x67/0x220 [ 759.973176][T21467] do_syscall_64+0xfd/0x680 [ 759.977701][T21467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.983604][T21467] RIP: 0033:0x459519 [ 759.987510][T21467] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.007128][T21467] RSP: 002b:00007f92c78efc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 760.015634][T21467] RAX: ffffffffffffffda RBX: 00007f92c78efc90 RCX: 0000000000459519 08:16:25 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0xf6ffffff00000000}]}, 0x18, 0x0) [ 760.023637][T21467] RDX: 0000000020000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 760.031639][T21467] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 760.039615][T21467] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f92c78f06d4 [ 760.047585][T21467] R13: 00000000004c6af0 R14: 00000000004dbd68 R15: 0000000000000009 08:16:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 760.129873][T21602] CPU: 0 PID: 21602 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 760.138440][T21602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.138448][T21602] Call Trace: [ 760.138473][T21602] dump_stack+0x172/0x1f0 [ 760.138497][T21602] should_fail.cold+0xa/0x15 [ 760.138516][T21602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.138536][T21602] ? ___might_sleep+0x163/0x280 [ 760.138557][T21602] __should_failslab+0x121/0x190 [ 760.138576][T21602] should_failslab+0x9/0x14 [ 760.138589][T21602] __kmalloc+0x2d9/0x740 [ 760.138607][T21602] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 760.138626][T21602] ? rcu_read_lock_sched_held+0x110/0x130 [ 760.138640][T21602] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 760.138659][T21602] tomoyo_realpath_from_path+0xcd/0x7a0 [ 760.138684][T21602] tomoyo_mount_acl+0x149/0x840 [ 760.138704][T21602] ? kasan_check_write+0x14/0x20 [ 760.138721][T21602] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 760.138742][T21602] ? lock_downgrade+0x880/0x880 [ 760.156436][T21602] ? mark_held_locks+0xf0/0xf0 [ 760.156453][T21602] ? perf_trace_lock_acquire+0xf5/0x530 [ 760.156487][T21602] ? lock_acquire+0x16f/0x3f0 [ 760.185347][T21602] ? tomoyo_mount_permission+0x10a/0x410 [ 760.185370][T21602] tomoyo_mount_permission+0x16a/0x410 [ 760.185385][T21602] ? tomoyo_mount_permission+0x10a/0x410 [ 760.185410][T21602] ? tomoyo_mount_acl+0x840/0x840 [ 760.185427][T21602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.185455][T21602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.185471][T21602] ? strncpy_from_user+0x2ac/0x380 [ 760.185490][T21602] tomoyo_sb_mount+0x35/0x40 [ 760.185512][T21602] security_sb_mount+0x87/0xd0 [ 760.185533][T21602] do_mount+0x1d4/0x1c00 [ 760.185553][T21602] ? copy_mount_string+0x40/0x40 [ 760.185570][T21602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.185584][T21602] ? _copy_from_user+0xdd/0x150 [ 760.185603][T21602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.185618][T21602] ? copy_mount_options+0x280/0x3a0 [ 760.185639][T21602] ksys_mount+0xdb/0x150 [ 760.185658][T21602] __x64_sys_mount+0xbe/0x150 [ 760.185680][T21602] do_syscall_64+0xfd/0x680 [ 760.185701][T21602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.185719][T21602] RIP: 0033:0x459519 [ 760.202869][T21602] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.202879][T21602] RSP: 002b:00007f895f9e0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 760.202895][T21602] RAX: ffffffffffffffda RBX: 00007f895f9e0c90 RCX: 0000000000459519 [ 760.202904][T21602] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 760.202913][T21602] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 760.202922][T21602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895f9e16d4 [ 760.202930][T21602] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 [ 760.363153][T21602] ERROR: Out of memory at tomoyo_realpath_from_path. 08:16:25 executing program 4 (fault-call:4 fault-nth:4): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:25 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x2}]}, 0x18, 0x0) 08:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7b, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:26 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xee}]}, 0x18, 0x0) [ 760.694312][T21844] FAULT_INJECTION: forcing a failure. [ 760.694312][T21844] name failslab, interval 1, probability 0, space 0, times 0 [ 760.808275][T21844] CPU: 1 PID: 21844 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 760.816307][T21844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.826392][T21844] Call Trace: [ 760.829715][T21844] dump_stack+0x172/0x1f0 [ 760.834071][T21844] should_fail.cold+0xa/0x15 [ 760.838687][T21844] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.844628][T21844] ? ___might_sleep+0x163/0x280 [ 760.849496][T21844] __should_failslab+0x121/0x190 [ 760.854455][T21844] should_failslab+0x9/0x14 [ 760.859320][T21844] __kmalloc+0x2d9/0x740 [ 760.863873][T21844] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 760.869655][T21844] ? rcu_read_lock_sched_held+0x110/0x130 [ 760.875411][T21844] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 760.881150][T21844] tomoyo_realpath_from_path+0xcd/0x7a0 [ 760.886721][T21844] tomoyo_mount_acl+0x149/0x840 [ 760.891602][T21844] ? kasan_check_write+0x14/0x20 [ 760.896555][T21844] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 760.902130][T21844] ? lock_downgrade+0x880/0x880 [ 760.907085][T21844] ? mark_held_locks+0xf0/0xf0 [ 760.911861][T21844] ? perf_trace_lock_acquire+0xf5/0x530 [ 760.917454][T21844] ? lock_acquire+0x16f/0x3f0 [ 760.922160][T21844] ? tomoyo_mount_permission+0x10a/0x410 [ 760.927825][T21844] tomoyo_mount_permission+0x16a/0x410 [ 760.933293][T21844] ? tomoyo_mount_permission+0x10a/0x410 [ 760.938937][T21844] ? tomoyo_mount_acl+0x840/0x840 [ 760.943980][T21844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.950241][T21844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.956491][T21844] ? strncpy_from_user+0x2ac/0x380 [ 760.961820][T21844] tomoyo_sb_mount+0x35/0x40 [ 760.966429][T21844] security_sb_mount+0x87/0xd0 [ 760.971209][T21844] do_mount+0x1d4/0x1c00 [ 760.975471][T21844] ? copy_mount_string+0x40/0x40 [ 760.980418][T21844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.986692][T21844] ? _copy_from_user+0xdd/0x150 [ 760.991561][T21844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.997913][T21844] ? copy_mount_options+0x280/0x3a0 [ 761.003149][T21844] ksys_mount+0xdb/0x150 [ 761.007409][T21844] __x64_sys_mount+0xbe/0x150 [ 761.012101][T21844] do_syscall_64+0xfd/0x680 [ 761.016615][T21844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.022532][T21844] RIP: 0033:0x459519 [ 761.026433][T21844] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.046044][T21844] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 761.054471][T21844] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 761.062832][T21844] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 761.070820][T21844] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 761.078794][T21844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 761.086857][T21844] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:26 executing program 0 (fault-call:18 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:26 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x4000}]}, 0x18, 0x0) 08:16:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, 0x0, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x28100, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='memory\xee\\\x05\xe8#\xd0X\xd3e8\x9e\x15\xf8\x00\x00\x00\x00\xc7\x8e77\xaa\x18\t\x00\x00\x00\xeb\x99G\x00\xcd\xe1v\xd2\xec\xd9\xdc\x1aYxL\xef\x92\xbf\xc5\xbam\xce\xcb\x84\xb2\xb7dB3\xda\x8a\xac\x9c\x06\xb7\x91\x9a\xd00\x87`\x9b\xdd\x05\x7f\xaev\x06\xd7\x01\xf9\xb2\x13\xd4f\x8b\xa0\xb7\xe47to4\x88+L\x02\xd0N\x1b \xc0\x0fyV\x0e\x1c\x18\xab#\x02\xa0~\xf6\xba\\\x9c\xdb\x99&r\x17\xad\xe0\xd4\xce\xc1M\x9a\"\x11\xdfS4\xd0l;i\xe4\x04\x9e\n\xb2\xa7R\xe0\rh\x8a\x99u\x8f\x99U\xb8\xc4)o\xdd.)\xab\xa7\x12Y\x81\xff\xa3P\xab\x16<\x12|+v\xd1z\nh\x90)\xde\xe3\xb7>\r!\xec^K|\x892y\xf4\x87\rz\xbb\xef\xe7vY\xea\xa2X\x9a\x9b\t\t\xff\xbc\x919\xd4\xfe\x16q\xb4', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0xc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 761.369208][T21844] ERROR: Out of memory at tomoyo_realpath_from_path. 08:16:26 executing program 4 (fault-call:4 fault-nth:5): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:26 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xee00}]}, 0x18, 0x0) 08:16:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7d, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 761.814655][T22346] input: syz0 as /devices/virtual/input/input748 [ 761.858285][T22321] FAULT_INJECTION: forcing a failure. [ 761.858285][T22321] name failslab, interval 1, probability 0, space 0, times 0 [ 761.869135][T22358] FAULT_INJECTION: forcing a failure. [ 761.869135][T22358] name failslab, interval 1, probability 0, space 0, times 0 [ 761.966239][T22321] CPU: 1 PID: 22321 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #42 [ 761.974279][T22321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.984382][T22321] Call Trace: [ 761.987710][T22321] dump_stack+0x172/0x1f0 [ 761.992083][T22321] should_fail.cold+0xa/0x15 [ 761.996798][T22321] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.002748][T22321] ? ___might_sleep+0x163/0x280 [ 762.007639][T22321] __should_failslab+0x121/0x190 [ 762.012636][T22321] should_failslab+0x9/0x14 [ 762.017156][T22321] __kmalloc+0x2d9/0x740 [ 762.021428][T22321] ? iter_file_splice_write+0x16e/0xbd0 [ 762.027042][T22321] iter_file_splice_write+0x16e/0xbd0 [ 762.032469][T22321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.038741][T22321] ? generic_file_splice_read+0x537/0x800 [ 762.044486][T22321] ? page_cache_pipe_buf_steal+0x2b0/0x2b0 [ 762.050309][T22321] ? add_to_pipe+0x350/0x350 [ 762.054941][T22321] ? rw_verify_area+0x126/0x360 [ 762.059803][T22321] ? page_cache_pipe_buf_steal+0x2b0/0x2b0 08:16:27 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xee0000}]}, 0x18, 0x0) [ 762.065622][T22321] direct_splice_actor+0x123/0x190 [ 762.070760][T22321] splice_direct_to_actor+0x366/0x970 [ 762.076153][T22321] ? generic_pipe_buf_nosteal+0x10/0x10 [ 762.081732][T22321] ? do_splice_to+0x180/0x180 [ 762.086430][T22321] ? generic_pipe_buf_nosteal+0x10/0x10 [ 762.091996][T22321] do_splice_direct+0x1da/0x2a0 [ 762.096864][T22321] ? splice_direct_to_actor+0x970/0x970 [ 762.102436][T22321] ? rcu_read_lock_sched_held+0x110/0x130 [ 762.108174][T22321] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 762.113777][T22321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.120122][T22321] ? __sb_start_write+0x1ac/0x360 [ 762.125167][T22321] do_sendfile+0x597/0xd00 [ 762.129615][T22321] ? do_compat_pwritev64+0x1c0/0x1c0 [ 762.134957][T22321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.141212][T22321] ? _copy_from_user+0xdd/0x150 [ 762.146087][T22321] __x64_sys_sendfile64+0x15a/0x220 [ 762.151305][T22321] ? __ia32_sys_sendfile+0x230/0x230 [ 762.156604][T22321] ? do_syscall_64+0x26/0x680 [ 762.161304][T22321] ? lockdep_hardirqs_on+0x418/0x5d0 08:16:27 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x1000000}]}, 0x18, 0x0) [ 762.166632][T22321] ? trace_hardirqs_on+0x67/0x220 [ 762.171677][T22321] do_syscall_64+0xfd/0x680 [ 762.176245][T22321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.182143][T22321] RIP: 0033:0x459519 [ 762.186046][T22321] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.205661][T22321] RSP: 002b:00007f92c7910c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 762.214597][T22321] RAX: ffffffffffffffda RBX: 00007f92c7910c90 RCX: 0000000000459519 [ 762.222653][T22321] RDX: 0000000020000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 762.230622][T22321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 762.238593][T22321] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f92c79116d4 [ 762.246578][T22321] R13: 00000000004c6af0 R14: 00000000004dbd68 R15: 0000000000000005 [ 762.254780][T22358] CPU: 0 PID: 22358 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 762.262782][T22358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.272835][T22358] Call Trace: [ 762.272862][T22358] dump_stack+0x172/0x1f0 [ 762.272885][T22358] should_fail.cold+0xa/0x15 [ 762.272912][T22358] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.290945][T22358] ? ___might_sleep+0x163/0x280 [ 762.295834][T22358] __should_failslab+0x121/0x190 [ 762.300785][T22358] should_failslab+0x9/0x14 [ 762.305303][T22358] __kmalloc+0x2d9/0x740 [ 762.305327][T22358] ? tomoyo_encode2.part.0+0xf5/0x400 [ 762.305346][T22358] tomoyo_encode2.part.0+0xf5/0x400 [ 762.305359][T22358] ? __get_fs_type+0x9a/0xd0 [ 762.305378][T22358] tomoyo_encode+0x2b/0x50 [ 762.305401][T22358] tomoyo_mount_acl+0x320/0x840 [ 762.305428][T22358] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 762.305449][T22358] ? lock_downgrade+0x880/0x880 [ 762.345115][T22358] ? mark_held_locks+0xf0/0xf0 [ 762.349906][T22358] ? lock_acquire+0x16f/0x3f0 [ 762.349923][T22358] ? tomoyo_mount_permission+0x10a/0x410 [ 762.349946][T22358] tomoyo_mount_permission+0x16a/0x410 [ 762.365781][T22358] ? tomoyo_mount_permission+0x10a/0x410 [ 762.371518][T22358] ? tomoyo_mount_acl+0x840/0x840 [ 762.376563][T22358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.382826][T22358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.389083][T22358] ? strncpy_from_user+0x2ac/0x380 [ 762.394209][T22358] tomoyo_sb_mount+0x35/0x40 [ 762.398819][T22358] security_sb_mount+0x87/0xd0 [ 762.403605][T22358] do_mount+0x1d4/0x1c00 [ 762.407868][T22358] ? copy_mount_string+0x40/0x40 08:16:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") pipe(&(0x7f00000000c0)) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffdd9, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0xb, 0xa, 0x5, 0x5, 0xb, 0x6, 0x4, 0x5b}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 762.412825][T22358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.419079][T22358] ? _copy_from_user+0xdd/0x150 [ 762.423948][T22358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.430204][T22358] ? copy_mount_options+0x280/0x3a0 [ 762.435434][T22358] ksys_mount+0xdb/0x150 [ 762.439693][T22358] __x64_sys_mount+0xbe/0x150 [ 762.444397][T22358] do_syscall_64+0xfd/0x680 [ 762.448919][T22358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.454839][T22358] RIP: 0033:0x459519 [ 762.458745][T22358] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.478559][T22358] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 762.478575][T22358] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 762.478583][T22358] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 762.478591][T22358] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:16:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, 0x0, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 762.478599][T22358] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 762.478607][T22358] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:28 executing program 4 (fault-call:4 fault-nth:6): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:28 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_SECUREBITS(0x1c, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x400) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:28 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x2000000}]}, 0x18, 0x0) [ 762.812568][T22883] FAULT_INJECTION: forcing a failure. [ 762.812568][T22883] name failslab, interval 1, probability 0, space 0, times 0 [ 762.828123][T22883] CPU: 0 PID: 22883 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 762.836130][T22883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.846199][T22883] Call Trace: [ 762.849505][T22883] dump_stack+0x172/0x1f0 [ 762.853857][T22883] should_fail.cold+0xa/0x15 [ 762.858465][T22883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.864298][T22883] ? ___might_sleep+0x163/0x280 [ 762.869165][T22883] __should_failslab+0x121/0x190 [ 762.874122][T22883] should_failslab+0x9/0x14 [ 762.878674][T22883] kmem_cache_alloc_trace+0x2ce/0x750 [ 762.884076][T22883] alloc_fs_context+0x5a/0x690 [ 762.888856][T22883] fs_context_for_mount+0x25/0x30 [ 762.893893][T22883] do_mount+0x132d/0x1c00 [ 762.898249][T22883] ? copy_mount_string+0x40/0x40 [ 762.903216][T22883] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.909466][T22883] ? _copy_from_user+0xdd/0x150 [ 762.914327][T22883] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.920595][T22883] ? copy_mount_options+0x280/0x3a0 [ 762.920616][T22883] ksys_mount+0xdb/0x150 [ 762.920636][T22883] __x64_sys_mount+0xbe/0x150 [ 762.920656][T22883] do_syscall_64+0xfd/0x680 [ 762.920677][T22883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.920689][T22883] RIP: 0033:0x459519 [ 762.920707][T22883] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.920715][T22883] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 762.920730][T22883] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 762.920747][T22883] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 762.934845][T22883] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 762.934855][T22883] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 762.934863][T22883] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 [ 763.011847][T22670] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:28 executing program 4 (fault-call:4 fault-nth:7): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 763.173440][T22670] FAT-fs (loop5): Filesystem has been set read-only 08:16:28 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7e, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:28 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x40000000}]}, 0x18, 0x0) 08:16:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000)=0x4, 0x4) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x80, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000100)={0x3, 0x100000001}) [ 763.448317][T23112] FAULT_INJECTION: forcing a failure. [ 763.448317][T23112] name failslab, interval 1, probability 0, space 0, times 0 [ 763.483002][T23112] CPU: 1 PID: 23112 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 763.491072][T23112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.501161][T23112] Call Trace: [ 763.504477][T23112] dump_stack+0x172/0x1f0 [ 763.508964][T23112] should_fail.cold+0xa/0x15 [ 763.513593][T23112] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.519453][T23112] ? ___might_sleep+0x163/0x280 [ 763.524325][T23112] __should_failslab+0x121/0x190 [ 763.529373][T23112] should_failslab+0x9/0x14 [ 763.533916][T23112] __kmalloc+0x2d9/0x740 [ 763.538179][T23112] ? tomoyo_encode2.part.0+0xf5/0x400 [ 763.543581][T23112] tomoyo_encode2.part.0+0xf5/0x400 [ 763.548792][T23112] ? __get_fs_type+0x9a/0xd0 [ 763.553403][T23112] tomoyo_encode+0x2b/0x50 [ 763.557827][T23112] tomoyo_mount_acl+0x320/0x840 [ 763.557854][T23112] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 763.557876][T23112] ? lock_downgrade+0x880/0x880 [ 763.568290][T23112] ? mark_held_locks+0xf0/0xf0 [ 763.568334][T23112] ? lock_acquire+0x16f/0x3f0 [ 763.568349][T23112] ? tomoyo_mount_permission+0x10a/0x410 [ 763.568373][T23112] tomoyo_mount_permission+0x16a/0x410 [ 763.593857][T23112] ? tomoyo_mount_permission+0x10a/0x410 [ 763.599509][T23112] ? tomoyo_mount_acl+0x840/0x840 [ 763.604541][T23112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.610797][T23112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.618045][T23112] ? strncpy_from_user+0x2ac/0x380 [ 763.623206][T23112] tomoyo_sb_mount+0x35/0x40 [ 763.627820][T23112] security_sb_mount+0x87/0xd0 [ 763.632596][T23112] do_mount+0x1d4/0x1c00 [ 763.636850][T23112] ? copy_mount_string+0x40/0x40 [ 763.641794][T23112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.648035][T23112] ? _copy_from_user+0xdd/0x150 [ 763.652900][T23112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.659164][T23112] ? copy_mount_options+0x280/0x3a0 [ 763.664544][T23112] ksys_mount+0xdb/0x150 [ 763.668795][T23112] __x64_sys_mount+0xbe/0x150 [ 763.673503][T23112] do_syscall_64+0xfd/0x680 [ 763.678015][T23112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.683940][T23112] RIP: 0033:0x459519 [ 763.687837][T23112] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.707445][T23112] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 763.715867][T23112] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 763.723862][T23112] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 763.731840][T23112] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 763.739819][T23112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 763.747793][T23112] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 [ 763.826098][T22894] input: syz0 as /devices/virtual/input/input750 08:16:29 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x8cffffff}]}, 0x18, 0x0) 08:16:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x7}, @window={0x3, 0x1, 0x7ff}, @timestamp, @timestamp, @mss={0x2, 0x8}], 0x5) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x6, 0x10, 0x1}, &(0x7f0000000100)=0x18) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x9}, &(0x7f0000000180)=0x8) 08:16:29 executing program 4 (fault-call:4 fault-nth:8): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:29 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, 0x0, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 764.287580][T23432] FAULT_INJECTION: forcing a failure. [ 764.287580][T23432] name failslab, interval 1, probability 0, space 0, times 0 [ 764.350780][T23432] CPU: 0 PID: 23432 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 764.358809][T23432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.368906][T23432] Call Trace: [ 764.372227][T23432] dump_stack+0x172/0x1f0 [ 764.376589][T23432] should_fail.cold+0xa/0x15 [ 764.381227][T23432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.387081][T23432] ? ___might_sleep+0x163/0x280 [ 764.391955][T23432] __should_failslab+0x121/0x190 [ 764.397018][T23432] should_failslab+0x9/0x14 [ 764.401543][T23432] kmem_cache_alloc_trace+0x2ce/0x750 [ 764.406976][T23432] alloc_fs_context+0x5a/0x690 [ 764.411767][T23432] fs_context_for_mount+0x25/0x30 [ 764.416810][T23432] do_mount+0x132d/0x1c00 [ 764.421166][T23432] ? copy_mount_string+0x40/0x40 [ 764.426125][T23432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.432374][T23432] ? _copy_from_user+0xdd/0x150 [ 764.437253][T23432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.443510][T23432] ? copy_mount_options+0x280/0x3a0 [ 764.448736][T23432] ksys_mount+0xdb/0x150 [ 764.452994][T23432] __x64_sys_mount+0xbe/0x150 [ 764.453017][T23432] do_syscall_64+0xfd/0x680 [ 764.453038][T23432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.453050][T23432] RIP: 0033:0x459519 [ 764.453067][T23432] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.453075][T23432] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 764.453089][T23432] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 764.453097][T23432] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 764.453116][T23432] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 764.462288][T23432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 764.462298][T23432] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x6, 0x2000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:29 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xf6ffffff}]}, 0x18, 0x0) 08:16:29 executing program 4 (fault-call:4 fault-nth:9): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:29 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x2, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 764.745563][T23553] FAULT_INJECTION: forcing a failure. [ 764.745563][T23553] name failslab, interval 1, probability 0, space 0, times 0 [ 764.813036][T23553] CPU: 1 PID: 23553 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 764.821064][T23553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.831136][T23553] Call Trace: [ 764.834460][T23553] dump_stack+0x172/0x1f0 [ 764.838820][T23553] should_fail.cold+0xa/0x15 [ 764.843436][T23553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.849257][T23553] ? ___might_sleep+0x163/0x280 [ 764.854131][T23553] __should_failslab+0x121/0x190 [ 764.859090][T23553] should_failslab+0x9/0x14 [ 764.863604][T23553] kmem_cache_alloc_trace+0x2ce/0x750 [ 764.868987][T23553] ? lockdep_init_map+0x1be/0x6d0 [ 764.874086][T23553] legacy_init_fs_context+0x48/0xe0 [ 764.879310][T23553] ? generic_parse_monolithic+0x200/0x200 [ 764.885040][T23553] alloc_fs_context+0x3a7/0x690 [ 764.890257][T23553] fs_context_for_mount+0x25/0x30 [ 764.895302][T23553] do_mount+0x132d/0x1c00 [ 764.899682][T23553] ? copy_mount_string+0x40/0x40 [ 764.904639][T23553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 08:16:30 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xffffff8c}]}, 0x18, 0x0) 08:16:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8000, 0x20100) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000680)={0x0, @remote, @dev}, &(0x7f00000006c0)=0xc) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000840)={&(0x7f0000000700)={0x1d, r2}, 0x10, &(0x7f0000000800)={&(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\x00\x00@\x00'/16, @ANYRES64=r3, @ANYRES64=r4/1000+30000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="02000080010000000200002005b74a009950a13b5918107f"], 0x48}}, 0x40080) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000240)={0x20, 0x0, 0x5, 0x8, 0x6, 0x800}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x0, 0x1, 0x7f, 0x1}, {0xfffffffffffffffb, 0x20, 0x8000, 0x1}, {0x7, 0x7ff, 0x11, 0x401}, {0x4, 0x4, 0x8, 0x4}, {0x5, 0x200, 0xffffffffffff0001, 0x2000}, {0x0, 0x40, 0x0, 0x2}, {0x4b, 0x8, 0x1ff, 0xffffffff}, {0x0, 0x1000, 0x3, 0xfe}, {0x4, 0x3, 0x67, 0x6}]}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x6) ioctl$TIOCLINUX2(r5, 0x541c, &(0x7f00000000c0)={0x2, 0x0, 0x7aae, 0x5dc, 0x0, 0x1}) [ 764.910911][T23553] ? _copy_from_user+0xdd/0x150 [ 764.915788][T23553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.922063][T23553] ? copy_mount_options+0x280/0x3a0 [ 764.927382][T23553] ksys_mount+0xdb/0x150 [ 764.931664][T23553] __x64_sys_mount+0xbe/0x150 [ 764.936350][T23553] do_syscall_64+0xfd/0x680 [ 764.936374][T23553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.936386][T23553] RIP: 0033:0x459519 [ 764.936402][T23553] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.936418][T23553] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 764.947190][T23553] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 764.947200][T23553] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 764.947208][T23553] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 764.947217][T23553] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 08:16:30 executing program 4 (fault-call:4 fault-nth:10): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 764.947227][T23553] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, 0x0, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 765.310614][T23789] FAULT_INJECTION: forcing a failure. [ 765.310614][T23789] name failslab, interval 1, probability 0, space 0, times 0 [ 765.418665][T23789] CPU: 0 PID: 23789 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 765.426702][T23789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.436773][T23789] Call Trace: [ 765.440090][T23789] dump_stack+0x172/0x1f0 [ 765.444450][T23789] should_fail.cold+0xa/0x15 [ 765.449067][T23789] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.454926][T23789] ? ___might_sleep+0x163/0x280 [ 765.459796][T23789] __should_failslab+0x121/0x190 [ 765.464752][T23789] should_failslab+0x9/0x14 [ 765.469274][T23789] __kmalloc_track_caller+0x2d5/0x740 [ 765.474670][T23789] ? v9fs_session_init+0xef/0x18c0 [ 765.479810][T23789] kstrdup+0x3a/0x70 [ 765.483738][T23789] v9fs_session_init+0xef/0x18c0 [ 765.488700][T23789] ? find_held_lock+0x35/0x130 [ 765.493483][T23789] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 765.499163][T23789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.505427][T23789] ? should_fail+0x1de/0x852 [ 765.510523][T23789] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.516353][T23789] ? v9fs_show_options+0x7e0/0x7e0 [ 765.521490][T23789] ? v9fs_mount+0x5e/0x920 [ 765.525914][T23789] ? rcu_read_lock_sched_held+0x110/0x130 [ 765.531640][T23789] ? kmem_cache_alloc_trace+0x351/0x750 [ 765.537196][T23789] ? legacy_init_fs_context+0x48/0xe0 [ 765.542577][T23789] ? rcu_read_lock_sched_held+0x110/0x130 [ 765.548308][T23789] ? kmem_cache_alloc_trace+0x351/0x750 [ 765.553865][T23789] v9fs_mount+0x7d/0x920 [ 765.558141][T23789] ? v9fs_write_inode+0x70/0x70 [ 765.563024][T23789] legacy_get_tree+0x108/0x220 [ 765.567804][T23789] ? legacy_parse_monolithic+0x11f/0x180 [ 765.573466][T23789] vfs_get_tree+0x8e/0x390 [ 765.577909][T23789] do_mount+0x138c/0x1c00 [ 765.582248][T23789] ? copy_mount_string+0x40/0x40 [ 765.587198][T23789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.593458][T23789] ? _copy_from_user+0xdd/0x150 [ 765.598324][T23789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.604576][T23789] ? copy_mount_options+0x280/0x3a0 [ 765.609833][T23789] ksys_mount+0xdb/0x150 [ 765.614096][T23789] __x64_sys_mount+0xbe/0x150 [ 765.619956][T23789] do_syscall_64+0xfd/0x680 [ 765.624568][T23789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.630478][T23789] RIP: 0033:0x459519 [ 765.634467][T23789] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.654081][T23789] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:16:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000140)="8cc1a5045e0bcfec7be070aac7698a08b1f0cb4d6de777888b37b8eb55509883dca918a2b288e0c072529e9a63fb5023d6e52d4b4747aaec1b22e1dfdb85b0910f2833a515d9589094d174bce190c2f3573c4ba5e8f66c2781d3f6cd3f6997efba57afa323b469b256471fd6563babcbe0a4b11e5349c659107206e98ee2c4b414a60ba66f23ec8f99e34aaad4b317dd1df4ac539c2d2580502367b7579864bca7bb9ca7b8639d3d568171917cb796c5ceb1b08ad284318f00a35c59b5d7234d2ec5517b28a5dc5b95d82bf3e337efd14d5eaf54f29d") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$notify(r1, 0x402, 0x80000012) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 765.662504][T23789] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 765.670485][T23789] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 765.678473][T23789] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 765.686449][T23789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 765.694426][T23789] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 08:16:31 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xfffffff6}]}, 0x18, 0x0) 08:16:31 executing program 4 (fault-call:4 fault-nth:11): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x3, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 766.036560][T23769] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 766.177801][T24152] FAULT_INJECTION: forcing a failure. [ 766.177801][T24152] name failslab, interval 1, probability 0, space 0, times 0 [ 766.267893][T24152] CPU: 1 PID: 24152 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #42 [ 766.275928][T24152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.286002][T24152] Call Trace: [ 766.289324][T24152] dump_stack+0x172/0x1f0 [ 766.293687][T24152] should_fail.cold+0xa/0x15 [ 766.298313][T24152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.304149][T24152] ? ___might_sleep+0x163/0x280 [ 766.309025][T24152] __should_failslab+0x121/0x190 [ 766.310994][T23769] FAT-fs (loop5): Filesystem has been set read-only [ 766.313979][T24152] should_failslab+0x9/0x14 [ 766.313996][T24152] __kmalloc_track_caller+0x2d5/0x740 [ 766.314018][T24152] ? v9fs_session_init+0xae/0x18c0 [ 766.314040][T24152] kstrdup+0x3a/0x70 [ 766.314057][T24152] v9fs_session_init+0xae/0x18c0 [ 766.314072][T24152] ? find_held_lock+0x35/0x130 [ 766.314092][T24152] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 766.325197][T24152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.335694][T24152] ? should_fail+0x1de/0x852 [ 766.335715][T24152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.335735][T24152] ? v9fs_show_options+0x7e0/0x7e0 [ 766.335756][T24152] ? v9fs_mount+0x5e/0x920 [ 766.335778][T24152] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.344595][T24152] ? kmem_cache_alloc_trace+0x351/0x750 [ 766.344612][T24152] ? legacy_init_fs_context+0x48/0xe0 [ 766.344628][T24152] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.344642][T24152] ? kmem_cache_alloc_trace+0x351/0x750 [ 766.344663][T24152] v9fs_mount+0x7d/0x920 [ 766.344683][T24152] ? v9fs_write_inode+0x70/0x70 [ 766.418402][T24152] legacy_get_tree+0x108/0x220 [ 766.423186][T24152] ? legacy_parse_monolithic+0x11f/0x180 [ 766.428870][T24152] vfs_get_tree+0x8e/0x390 [ 766.433395][T24152] do_mount+0x138c/0x1c00 [ 766.437750][T24152] ? copy_mount_string+0x40/0x40 [ 766.442697][T24152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.448929][T24152] ? _copy_from_user+0xdd/0x150 [ 766.453784][T24152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.460026][T24152] ? copy_mount_options+0x280/0x3a0 [ 766.465230][T24152] ksys_mount+0xdb/0x150 [ 766.469470][T24152] __x64_sys_mount+0xbe/0x150 [ 766.474140][T24152] do_syscall_64+0xfd/0x680 [ 766.478635][T24152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.484530][T24152] RIP: 0033:0x459519 [ 766.488438][T24152] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.508064][T24152] RSP: 002b:00007f895fa01c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:16:31 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xee000000000000}]}, 0x18, 0x0) [ 766.508081][T24152] RAX: ffffffffffffffda RBX: 00007f895fa01c90 RCX: 0000000000459519 [ 766.508089][T24152] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 766.508095][T24152] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 766.508103][T24152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f895fa026d4 [ 766.508112][T24152] R13: 00000000004c58d6 R14: 00000000004d9ff8 R15: 0000000000000005 [ 766.575963][T24226] input: syz0 as /devices/virtual/input/input757 08:16:31 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc6, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:31 executing program 4 (fault-call:4 fault-nth:12): setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, 0x0, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {{0x2, 0x4e23, @local}}, 0x1, 0x2, [{{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e21, @empty}}]}, 0x190) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:32 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x100000000000000}]}, 0x18, 0x0) 08:16:32 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x4, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000100)=""/212) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) fadvise64(r1, 0x5c, 0xff, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:32 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x200000000000000}]}, 0x18, 0x0) 08:16:32 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x2, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x63e, 0x800, 0x6, 0x215e, 0x0, 0x3, 0x8101, 0xd, 0xfffffffffffff828, 0xc8, 0x101, 0x800, 0xc07, 0x4, 0x5, 0x4, 0x9, 0xe6f2, 0x6, 0xffffffff, 0x285d, 0x5, 0x20, 0x4, 0x8, 0x7fff, 0x100000001, 0x199, 0x6ff, 0x0, 0xffffffff, 0xffffffff, 0x0, 0x8, 0x1, 0x2, 0x0, 0x5c0, 0x0, @perf_config_ext={0x100000000, 0x7}, 0x1000, 0x101, 0x8, 0xf, 0x8, 0x0, 0x1}, 0x0, 0x0, r1, 0xa) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0x3, 0x400}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="00022cbd7000fbdbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x80) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:32 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc8, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:33 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x4000000000000000}]}, 0x18, 0x0) [ 767.702165][T24662] input: syz0 as /devices/virtual/input/input760 08:16:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, 0x0, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:33 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x3, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x248, 0x2}, {0x6, 0x8000}], r1}, 0x18, 0x1) getrandom(0x0, 0xfffffffffffffe9b, 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)={0x2, @tick=0xd0d1, 0x1, {0x1f, 0x3}, 0x1, 0x2, 0x800}) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:33 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x4, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:33 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x8cffffff00000000}]}, 0x18, 0x0) 08:16:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x6, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:33 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x10000) syz_open_pts(r0, 0xef1601980c3d7985) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="3b84010757c9e0dc29c014f1715fbc01e70d081b4e002ac970b15e22f9a027e3c81b19da71b422eb035d592083b4341d70605d04744fcb76dde52f956fc72ecc06e971446864ac1e29f5e429e94af4db1f1abc56398f48a28cb109a60f461784de440d6424e9f6a08b7c2e6678e8d043b810fe26fd077cfb851ba0133237c5cd30f95a7a8aed339f9586c6434952") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f00000000c0)={0x3}) 08:16:33 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x5, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:34 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0xf6ffffff00000000}]}, 0x18, 0x0) 08:16:34 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc9, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x8000, 0x0) mq_timedsend(r1, &(0x7f0000000140)="39198eb048c706ba48e21d84947b011e55953d222c2d5eaf0b46e6e0cf4fad9f6ae2705643bcd31049e4665cda94a81be5355da7970c804e29c454fb897d38330517e221bfc55fc7bdcd52d77a492071f83b212cf0f62e508a9636071f617a60ff689c5d08be02658c2b1046ffb7bd5c2603758818b4fa9d8627cacbc60336954f27534886d6ba73d26e0681c94a47fec45775", 0x93, 0xff, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40804}, 0x40) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x4007fe) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000240)=0xfffffffffffffffe) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 08:16:34 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x6, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:34 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x2}]}, 0x18, 0x0) 08:16:34 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x7, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000380)="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", 0x145, 0x4800, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) getrandom(0x0, 0x241, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000000c0)={{0xff, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e24, 0x1, 'wrr\x00', 0x20, 0x6ac6, 0x35}, {@multicast2, 0x4e23, 0x10000, 0x400, 0x8}}, 0x44) getpeername(r1, &(0x7f0000000240)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000002c0)=0x80) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@local, @mcast2, @rand_addr="09e04769a92b051e096b615839a9763c", 0xe717, 0xfffffffffffff801, 0x9, 0x400, 0x81, 0x0, r2}) 08:16:34 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xee}]}, 0x18, 0x0) [ 769.478571][T25446] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 769.652454][T25446] FAT-fs (loop0): Filesystem has been set read-only 08:16:35 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x8, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:35 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xcb, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x8, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:35 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x4000}]}, 0x18, 0x0) 08:16:35 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x10, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2002, 0x0) faccessat(r2, &(0x7f00000000c0)='./file0\x00', 0x1, 0x500) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r3 = request_key(&(0x7f0000000400)='rig_ke\x1b\xa4\xedF\fQh\xe8\xef\x15\xd9\x8e\b9z\xb1Cd\x05\x91\xbaB\xf5\xedD\xb6\r?\xdb\xb9d\xd6B\x9f*MFCo\x8c\xb6>\t\xf1\xf4\xce\xb5\xdcD\x8f\xee:\xae\xeb\xed\xba\xc9\x00\xd8\xe1\xe2C\xa9\x90\x8f\a\xe9Z\x1f\xb1\xb8?(\x82\xf4W`\xe9\xad\xa4\xfb\xd6\x1e\xef+:\x19qe\xac\xc1\xe0o\xc8\xb4\xb1\xfc\x1f\x9eV\xc9\x12\xe4\x85\xc7\xffpm\'pq\x80\x9fh$\rj\x8d\xe9\r\b\x18\x1c\x0f\xdb\x82A2', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='/dev/vcsa#\x00', 0xfffffffffffffff9) r4 = add_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="57d6be89fc7abd3f85dfad691570423ef43d892aae6233e3810444d6b90829a8b973062cb396020e8b248f80d403701d28fd6253513e8b724109bb84d3d0a67ec4b04364e8b6a2efb5da96e111911e0355a35d25e271663f19109174b6b1729baf6f2082693f813f45a447b062af697eae6d26b4e7c065643f7587740ed1f0d31a5691be0deb9fe65be8", 0x8a, 0x0) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000280)=[{&(0x7f00000001c0)="82224ec08db06d0c60508ad78941a230aa13dc1e320f312a98b2f4fb3d4be3a349f85f9a5779c2a7cac64a1d528b3b62951611f7eaabe0a07df42a95bb7cfc7c4b106cece68fa197f79b6699336d57526dae7f4047f075bbbd0e319c04384c2646177ceb085ec3bdcb446091730476b3e4b59d10c9607d028bf6a3ead219c894a3335eab2cb7cbab22d97a9d7b948529c39f11d75934da0ef6cc23e6c0c81f25b885f07e6e4785cabf35cadfcbb39d282795ef262a32a36494", 0xb9}], 0x1, r4) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) fsetxattr(r1, &(0x7f00000004c0)=@random={'osx.', '\x00'}, &(0x7f0000000500)='/dev/vcsa#\x00', 0xb, 0x2) mq_open(&(0x7f0000000540)='hash\x00', 0x1, 0x4, &(0x7f0000000580)={0x6, 0x4, 0x2, 0x0, 0x401, 0x401, 0x3, 0x80000000}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) sendmmsg$sock(r5, &(0x7f0000004640)=[{{&(0x7f0000000740)=@hci={0x1f, r6, 0x3}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)="55610799cb47a2e624bb0c5b68106e9af93b7bd899278e85", 0x18}, {&(0x7f0000000800)="98f10c3c8833", 0x6}, {&(0x7f0000000840)="17b20541a014f19e5ac7052a8799055336cabf09c23fecd7c7abf5d883704cd4e0f5876d1b434028787f1828d3b9644e9e39865e57fddf8640fee060bfad6b703f37b0622fb1ce59b0c7d1aad045b73cf3c28828e2db7929fb3d1c99df3b1ca378e2c188ff1212d0a729f4680f5d4f29cc24ec7947084460d2feb312e41497531785b2052d4f6c8c9b81e06c279041143bbc2dc3602884dd565e35d0632fa43e851d6cb3f9d10053db0f3415e3f7672a2df9c5591098e757ca03962ebc21157face882394b83e1856029a8bca97a32f0c98d843b6f7b5d", 0xd7}], 0x3, &(0x7f0000000980)=[@mark={{0x14, 0x1, 0x24, 0x80}}], 0x18}}, {{&(0x7f00000009c0)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e21, 0x1}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000a40)="d72b47b9a9f7c5cb034b3c38bc9f379c2e9c443d67ed0206793113e13c13fb776d20aac889cdf4622647bf5250e8d3bceb0a9f3dd9a049cc987478e0692279129f97e0e63768c0a5f68b2871b9cda7ccfed3592e4c8af138f58467f0a28b0fa78756664009cc986f92b732", 0x6b}, {&(0x7f0000000ac0)="4ebc80ab91b290ad76badc12a8890c3712a0ed571326449d318631c6542a5f9dbf880f6e7206b0ed20a34a964e7bf0a821d88c60b2928640a8e5f0644ec386a541e3cf0c629388f99c07d9196febeab75616f86930e577ae78b7e4f58c6da025fc5003d052e562337db088733fa21e9698297fc1e06de28fc8c3fc3ba4ce7e942c7eeb876b744ad87402d38324fc1240e3e063d4f8e7d6d1882d52bae6e1ad7d9212a4b881cd6e2acbbe079e7324dec6b4ff6859cd2e6e58d7805cc4b052a9d2bcbf84f4807546beff99852ff1686aa54ada55b6514223fe5c56280085e77b635ef5ea39be6e6b812cc63d", 0xeb}, {&(0x7f0000000bc0)="f9ec7d95a315865e70ed9fe3d64f4c6c1a2a2515fbbe21264acc0c8446596227c6b55b9b9061a11920acf0b7e25492c1b1e0f076ee8b9099859b9b110c72c5358a1f4a2bf94fa52269e09eeefcfb5d2026c1eed81580233bba691b210eeba16b5c65e15d", 0x64}, {&(0x7f0000000c40)="241c870caed881436353fa14a63fc48e1c5ebeb7bd17b6f4407f843a93a41a5605ea9083ea3d24f41f0f4626d93ebb7e0e3142b84da0529ad99ee1c4d0bd70a5d82743aa7556af925911f6384b0b90cebe41e66970841dbd7d106a9fa89251a10407baadad4468c81be08740e7ef31e7516addd33440bbcbb464410ee54741c045287b9520f382cf7d221519ae3792debec77a8a577c94fa0b0bc8cf352031f26866304d3012792053033089ac31e853ed4c72f41814ea31887f16a19235a587aaf33e2e32cb05abb310997146a52f9f7bba6a79892b5b35fce32bf2900ece72c8024541919c34e37f0331eb48fe52", 0xef}, {&(0x7f0000000d40)="5a18937264eb00ab3568752f7cc02c0752d8add940d9d356ab21620919fb7fd19242e8c1800a509b659b01fd52ebd2b99045e9836ce154de3f0c4a02172006f20a34cd808b9fe5c8301fb33af04d044ed928a8b2ef16217fe0c593dd1f042dd2c34b848fc59a7d10680c30b53b76456cba9d4e65118a5da30cbba278e5360337856a3620830be7b279b1c0a8cf9ecae133a0d070e48a4a4991c0f96cb3b50a1e9d7d69a3187ee2bd06f67d83", 0xac}, {&(0x7f0000000e00)="9050a8dc116376a8889edb74eea2ff619331ef55ce859eff1ab82ff205ff16c14624f350ddc53ddb5a3cd62686b61acd68f2d8b461bd6d16585b73c7fcf771c37917c0a18ab142b05f4120dcc9cc3ddd4a2e0c7e783499dc6b81c78f5e84b1ede04b3eefe3bed0062ad04a633450a20bf813d71e073c689f89b146b2c4ab321b2cc249253c5442bc308cdc898d8eec706e54a1525c49a16b74286a0699a8398ae791f830c8deabc6a6b60835335e2c086e6afb37", 0xb4}, {&(0x7f0000000ec0)="7286613d4cdccc4420b5de722305d229ee78250e4bf54357d5042477b5055a520ae1dda05fbdceea2194ba6fa85a15a31a2dd952ef7b27ddcf0c998141230bbe282c0d627d6a128bdd4ec812d318367290d8f651010d51edbc9bfa", 0x5b}, {&(0x7f0000000f40)="cfe1861227466dc58fa6071b40de33bd96a17e865a9f1f23ed50819f1959330ba87aa21d69211d6746fb4349fd13cb36303b902b7209ab5adab5393d046e3d3585bc4e792e77410ebc35a30e985f1ff899879c0cf52df977b172fd60d46352d915464f1ccc627f09bbfb964a2745a324b3ef7938faf7ece16426ed86a54c7580725025e7221cea58ff57eeb6afe63e863fc8a49d5f716958179ae5e400246b94b4de57fb0f2c37b1f48b335b4618d4776d27b11ea8c44765d74c15b2f8c734a41023c45413260c9ee01611654a0efb21e6af304aee27a376ddd5dd2bc888f033fafa6b4a4c8c8de0c92c2ca935423331392c3e08f1a13f9d6e", 0xf9}], 0x8, &(0x7f00000010c0)=[@txtime={{0x18, 0x1, 0x3d, 0x100000000}}, @mark={{0x14, 0x1, 0x24, 0xa0}}], 0x30}}, {{&(0x7f0000001100)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x8, 0x3f, "eac91895f2c333dd628ed11d5119e0c767b6e4b512f99622ef8cdad48f4689e5e080a1ac2d44ec54a265e30e1ec8d5fded2da59698a1553ce733f88e73b821", 0x8}, 0x80, &(0x7f0000002340)=[{&(0x7f0000001180)="352489638922dca66092c947d4acc2f4e35327a0044747d726c322b06708ffe6b796dca21dc32d5e72201c342564efcfee09057b3122ef072965bb0928457361885400844632651f11e00cb062645a89f298f378d8fc1d0488e6cd5450309db39a8a518466079c6a44c3512359b5f4c14bb068bc6e24f951cedfc1a1225381c0eb0cd19a96a46cd7878cacb2a0463d7d0ce18ef53c13bc5274c2a12ca807301b4a95589b7feeee4d81918f0f62342d878d3e1d2799fc2ed2145ae3ab2d4a269770cc92c4ca35820dd4d7be1fd1955bcda05cfa9fe1f29a7fed5646ebefe823fcddc7912a404a12da50", 0xe9}, {&(0x7f0000001280)="6c33c268f489153909b431aac446151efcf45b0b20480f13d27b8730e992b90d0aad1059303067d2619cee12d79c22f5bade571ccf998c65a473847d5ce2129c", 0x40}, {&(0x7f00000012c0)="0da3ec3aeb3a7ce226f8fabd292a535e66816106654f9475c91c70b4d8d58ac57c1c83ea4aab8bd589d2005a45ab5a503ced1986791e25729e76d90bb4766d1bf5b2f27907344c4523", 0x49}, {&(0x7f0000001340)="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", 0x1000}], 0x4}}, {{&(0x7f0000002380)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x1ff, @rand_addr="4e17b16ede1594ae26d60055af0b89ca", 0x3}}, 0x80, &(0x7f0000002500)=[{&(0x7f0000002400)="d62313c5bfdf8d02cbf01a457e1caa4f7a21b57cba6106ec846ac72d09343a5dc88d369fd441036eaf9c2b763f908e8caa17d0bcf272afa15d136b481ec2fc350288be062dc8f09b14e63c4c2f4df822b79ae52c2ee41b28ade91c8513aac9d13e78d7c9897bfc19bfc5a2bfef5e2de11b699e0bef910e97a84cb3f59887ecb18ad06562686bbcaeb638aaade816fa65a407eeae4aa03bd32028e05eacaba9f2a24d993961c88875e4fcb6264c46fb09c60e099552b3edb55339d10664a314993916d21e7b92f6baf7324cfbcd65d3c1da888f2808de987e9c9116c007c2a3e2e272dce86dc4ea5c7ef267913f", 0xed}], 0x1, &(0x7f0000002540)=[@mark={{0x14, 0x1, 0x24, 0x10001}}], 0x18}}, {{&(0x7f0000002580)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002600)="29d273a67a2f23cf9a055febc0d2ee2192933139dfec297ec84c85d60b6dc974ea83920215178653b5bffaa4a6822bcf371f4df27516caca0cda69f0e4e318e54603d5a8a1a600ceb8773f9ba047e9fe16ea64cabb117463c171845fd44c06d6085f42cd6ecc1567849d20e1f03df1a1e33b6d9da106ade068f713c381e86e04abc322d4e90ced0ae05c7d3c38fa3ce208a5b59f8f9a91e425e5791fb71f1f60a0653e33e91d67a0e55ec8f60ac75b6ec0e7edd3d3c6fa99ecf0d207a983e12bb5eeb75417a4ee13571ce19c68ba8dc995ef75", 0xd3}, {&(0x7f0000002700)="c69e8222ca3db42e905bed8866aa133ecabefcecb58281f468471505514f5ed0d7a4962a999ea8846b3881268bf47d983b473e467d7f6edeaaf040ed0050ac20fb0ec27b4332c0091d2fac062b5d9509a7981832a679ed419948d81e06711dc80c6a0676922e5e59cb2d", 0x6a}, {&(0x7f0000002780)="13408cc738a8226f1817bbe36d95528da00993392ab4a31f0189766afcc3d6caf1cc87018fa9408d2eaf4f6dbb53c2c049b9f236dc958dd15b3eb9ca", 0x3c}, {&(0x7f00000027c0)="7d710b51a3d856a887a24f2b003ec09d36d175471f5953ff1e7a713a82fbe9366ea63aa481ce31553371416fba058ccf4a595b97068426f90892c7484032374a63e9ed928c9c58db4e00e9c5ec7f36a47fc5ebc0f1a209f0a3ce4df38af22cfd5a32480ca2714b6a38c5a259367e0a3829a17d3366aa1da8975e752441028076cedac442cd8dcbe37095a76e9274cdd3da79aad0d20d4da2ea9218a7f47d0fbb80f60ba352470a8fe116f49a92ac57b4e5c3db329bbe58", 0xb7}], 0x4, &(0x7f00000028c0)=[@timestamping={{0x14, 0x1, 0x25, 0x100400000}}, @mark={{0x14, 0x1, 0x24, 0xbd}}], 0x30}}, {{&(0x7f0000002900)=@in6={0xa, 0x4e22, 0x7, @local, 0x4}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002980)="cf2c63d330148f", 0x7}, {&(0x7f00000029c0)="97fc8ff50fa9ddf605cadb2f17989c78c4583ee5c4d6604045ec9c903278dd698901478da9f287d51bafb3bf996c85681146429546d7787615d8d0929abec15a3999e64d002ab7af08433fb5b408be4746c264cf9cb82671fe8b2146daf9cfb9ea236ea5e704f09a72f5946c9fd0e957c99843597969d2", 0x77}, {&(0x7f0000002a40)="fe862cdcc88ad59398e19deacddaf0c857c58aefe5c1bad7e4486b13bee5d44c08e59fa126d09302e96e4aa1a1bfdcb97d9eea1a18889947628427f11e99e42a292f3e524ca5718a6c8556d560d142d46ad4cd954585f68035bd5ef802a5f198aa0ea1763ec417c97a829441c1a540529e95e40ef5b8de12c713f96d139f34292d09670ca8521acffa4058a527ca3b254e73464fe9f1a64303ba52a5b3858e1dfd81a805da35c19c764557e19f6daa4b622fbf90d2a9974e0a83a1ea7e4e0ec4d222d8b12869d6a698d036506bb1a1c97c", 0xd1}], 0x3}}, {{&(0x7f0000002b80)=@in={0x2, 0x4e23, @empty}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000002c00)="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", 0x1000}, {&(0x7f0000003c00)="5aa9560510b95bd7a01bfa410382b6c576448e6814010290df160971155f3656509fad1b0325f127d0931b32c442c08b7dcf5c0e4df6adea2474d8f6b61d225f9bdc6aa93140aaf8a74f53b023f10b5a69d731799efd72fcd7f72e028d11b694052b50ac4e578946cf36525ab1fb171b70994a3debbb3983ac2d27215e5d61cc9d112d7c0fe09d5d30fd1d006e0ddaef28c51b35269644ac89ee69b523fd111944ff221b0683d9bf6eb2e26f4c6729d11b70fea767af886080", 0xb9}, {&(0x7f0000003cc0)="9bd264cc9c032ea8086a8f1ac26cd6c02e1a70cef6c0de500965ab936218096eef1c990f3857a65c353d5fe214625aab6b5c3a8b66804d", 0x37}, {&(0x7f0000003d00)="990aaadd82887c5016c71004fdd3955f479ea8ecac7cc87291f4915662ea4c2ea10c266a87864593a5eaf7697fe986a98c7441c5c11e5664153535f92b7a51c09d64bfa2983867ec533b4960bf08db050a312e3342fe302aa83435f337e26da1f4098cf2cedac98526c6e2b52857d28074519aa629d4a27d9d1613933d127f38163d1ab1950b6cb3b335ba937ebe252e4bdaa7632c7171674fa438", 0x9b}], 0x4, &(0x7f0000003e00)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xffffffffffff8000}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x60}}, {{&(0x7f0000003e80)=@in6={0xa, 0x4e21, 0x400, @mcast2, 0x3}, 0x80, &(0x7f0000004140)=[{&(0x7f0000003f00)="4a183bfab417379bee2d762d700a9fb0b87ced6d7760faeeed47c2be46f9e3faa7cfa83802919add064e24c2770300558ac530c4fd684dfe473082", 0x3b}, {&(0x7f0000003f40)="688d457d577b8f5fc9dadead9c37b89df15f91d64a7988b88a61d77f64673756e76be517c49417eb3770b28d8c9d22932e70a07866a08404dc8e3d5f4ebda45d4d6aefefe701a05073b6074c3eb8f0b2454ee10406468d24096e05e302de8cf9479bc87994258734d25d7f4b9c0a711d3c58d5105367a3183e34d8d3eeb5c1af40377060e6d135e45a4e2d3f300516a1cbb5d2196f4f7f5ae28f93c6ea80a29b3a5bc65bb38a81fc5b573e1bcc61e659facd", 0xb2}, {&(0x7f0000004000)="eb92bf881ebf5f29e393e11ec94b81f6ba05377bde6dc6f07f4c0174ed75cdc46822d67694fcbbca885bec19804d16adea8a77ce08c8dd6f88da7b1f793f535896a1b8b497ef209324e59309842e4934e3a76db5b528184cf2b1af1a1715a6fd3dfdc6fb9c3fab49a06561a55befab99b74f48e7a5d2a5752545875f4c167979", 0x80}, {&(0x7f0000004080)="db5409c1c5e4437fc96bcf838dc8fa2f7038c9c8c6cf0a0c93e903fa99c58329cdc3cdcf5d42b5c347a59680adf3f30aec7cfffa7559407746753cd59ffead0d7a65036a42068a5aa4e6e549511929c26ea3490e09e7e13b0100d4d52089696e4c46a1688990c51f7cd0bf0447a3917e8b0c37c8fcdeb88408db50cfe8a6595cc5e07d04fd81", 0x86}], 0x4}}, {{&(0x7f0000004180)=@nfc={0x27, 0x1, 0x1, 0x7}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004200)="a42f91a38083fd0a26a3394f74289593", 0x10}], 0x1, &(0x7f0000004280)=[@mark={{0x14, 0x1, 0x24, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0xd1a}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x80000000}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x80}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0xf0}}, {{&(0x7f0000004380)=@generic={0x1, "dc1810174a36d5ec9564bb1e2882061bbeb17c6d3963e1a22e843de744d45331ff488a30472db8694b7cce817399d8665a7529254d03ac716a0616dfa623d87be0f935ac7e6bc4fc6461acaf27e22c8d016ab7eae57e2cf290086599b9ca455e4be9d51e0550ac0398cbae452ea5f0efbcd6c0dadc245393e02179430a6d"}, 0x80, &(0x7f00000045c0)=[{&(0x7f0000004400)="c79bec90f039a689d8ff20d154e5f56fda2bba452b1a0f6e9fc696018b96333c3e529b3ad9aa8b346d61ddd1b8c65ad28caa5ed26ec2a89624c8bff9bca89ef4837722dba3cf219658cbd2ced73f12c6f57e47e8aa38b478a9df78fd1da21d49d31acc81dee58bf5a9141fa0c7a26d014928683126258d6610f0d26032f4bac388cbc95ea5943e34a6c4845f7585c6a387e653ffb25c1d3e373da2c25a7455533522d15201365269d1f1c8039c66e2eff8e6fd56d1b53e2d7e9c8aaf7f649872ef21e94257ba0a6c77850212841497497d94233e6a", 0xd5}, {&(0x7f0000004500)="340f73f9a507dd093dc53988eeb8744ce4622499c8ec13e4048e3e1975c968d6bad818a8ea89815ae9a79ff222f122d73d8aaf03dd82ba3edfb417eb8a6593e7001e755da7f4e3a37d5490bdb06e209ac843ad7b4bdcaf5cfeadf6e449e2926d6f6e61b1a6d84fc340d9f1003bf7536db6a0997ffd044b30720e8459a4a0add91b61a6239ebfe56b23bb5ec5eda7ba3eb6d55abac8b5c831b0351f885751a2ac9b096bff2963", 0xa6}], 0x2, &(0x7f0000004600)}}], 0xa, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000100)={'bcsf0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000048c0)={0x0, @bt={0x80, 0x1000, 0x0, 0x1, 0x9, 0x6, 0x3, 0x3, 0x7ff, 0xffffffffbccbeb5b, 0x7, 0x965, 0x5, 0xe20, 0x4, 0x2a}}) [ 770.247332][T26035] input: syz0 as /devices/virtual/input/input766 08:16:35 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x50, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:35 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xee00}]}, 0x18, 0x0) 08:16:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000000)) 08:16:36 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xf0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 770.674241][T26035] input: syz0 as /devices/virtual/input/input768 08:16:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x9, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:36 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xee0000}]}, 0x18, 0x0) [ 770.939511][T26263] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 771.024702][T26263] FAT-fs (loop5): Filesystem has been set read-only 08:16:36 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x121, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f00000000c0)="11dca5789bfcffffff00aebae39fb971aeb04736641b7af5e85960b541ac96e7b31d6df10c65e5717970030daab96d13f3a81209dbc64d58bc52bc7cff6e2a2989185ea21f1685d40330e39cd3a1c8912fabcb67957f878073e83f7c2035fbe089e285d992475182dcf00a3c1ae993c1846f3bc204b81d782c50f8da19b75ca168cfc3e5eb4aafb4bd49daf0d781d13f574e760233ae202728dcf00087b8c7e44b29db263229a44f99d9efec36ad14269bb0f90096df9db2c723c20159f0b47b30b9dbc551f57d6f2a0000000000") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:36 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x300, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:36 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x500, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 771.368689][T26808] input: syz0 as /devices/virtual/input/input769 08:16:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80007, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000140)=""/208) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:36 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x1000000}]}, 0x18, 0x0) 08:16:36 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x600, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:37 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x2000000}]}, 0x18, 0x0) 08:16:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(r2, 0x29, 0x108068, 0x0, 0xffffffffffffff24) ppoll(&(0x7f0000000180)=[{r1, 0x4004}, {r0, 0x80}, {r2, 0x8000}, {r0, 0x20}, {r0, 0x100}], 0x5, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)={0x1}, 0x8) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000140)=0x1e, 0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) pipe(&(0x7f0000000100)) [ 772.023818][T26625] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 772.122256][T27082] input: syz0 as /devices/virtual/input/input771 [ 772.181196][T26625] FAT-fs (loop0): Filesystem has been set read-only 08:16:37 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x700, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xc, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:37 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x242, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:37 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x40000000}]}, 0x18, 0x0) 08:16:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, 0x0) dup2(r5, r6) 08:16:37 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x1020, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5b4777e04b10e055ea86744033ff89b15ed6941") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0x311, 0x1) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 772.696067][T27394] input: syz0 as /devices/virtual/input/input773 08:16:38 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x8cffffff}]}, 0x18, 0x0) 08:16:38 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x2000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:38 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x300, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:38 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xf6ffffff}]}, 0x18, 0x0) 08:16:38 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x2010, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 773.342434][T27394] input: syz0 as /devices/virtual/input/input775 08:16:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xd, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f00000000c0)) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:38 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x4000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, 0x0) dup2(r5, r6) 08:16:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xffffff8c}]}, 0x18, 0x0) 08:16:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x3, 0x0, 0xffffffffffff4b14}}, 0x28) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x500, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:39 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x5000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xfffffff6}]}, 0x18, 0x0) [ 774.071783][T27993] input: syz0 as /devices/virtual/input/input777 08:16:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, 0x0) dup2(r5, r6) 08:16:39 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xedc0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) [ 774.506936][T28246] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 774.628136][T28246] FAT-fs (loop5): Filesystem has been set read-only [ 774.773966][T28127] input: syz0 as /devices/virtual/input/input779 [ 774.803088][T28204] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 774.859855][T28246] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 774.879338][T28331] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 774.913897][T28333] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 774.952380][T28331] FAT-fs (loop3): Filesystem has been set read-only 08:16:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xf, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:40 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xee000000000000}]}, 0x18, 0x0) 08:16:40 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xf000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) socket$tipc(0x1e, 0x7, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000000)=0x200, 0x4) 08:16:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x600, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) 08:16:40 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xff00, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:40 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x100000000000000}]}, 0x18, 0x0) 08:16:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) 08:16:40 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xf0ffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 775.567261][T28619] input: syz0 as /devices/virtual/input/input781 08:16:41 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x200000000000000}]}, 0x18, 0x0) 08:16:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x700, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 775.981978][T28619] input: syz0 as /devices/virtual/input/input784 08:16:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x10, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) 08:16:41 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x1000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2000001, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:41 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x4000000000000000}]}, 0x18, 0x0) 08:16:41 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x2000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 776.337868][T28983] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 776.436284][T28983] FAT-fs (loop5): Filesystem has been set read-only 08:16:41 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0x8cffffff00000000}]}, 0x18, 0x0) 08:16:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x900, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:41 executing program 2: syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x7ff, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000200)={0x4, 0x1, 0x2}) r2 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x1, 0x5080) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000140)=0x0) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000240)) sched_setparam(r3, &(0x7f0000000180)=0x3) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:42 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x3000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 776.767602][T29178] input: syz0 as /devices/virtual/input/input787 08:16:42 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{}, {0x0, 0xf6ffffff00000000}]}, 0x18, 0x0) 08:16:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(0xffffffffffffffff, r6) [ 777.197158][T29247] input: syz0 as /devices/virtual/input/input789 08:16:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x12, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:42 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x4000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x100) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:42 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:42 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x14, 0x0) 08:16:42 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x5000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x4, @mcast2}, {0xa, 0x4e24, 0xff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, r2, 0x7}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000200)={0xfffffffffffffff8, 0x0, 0x3003, 0x0, 0x7fff, {0x6, 0x4fd}, 0x1}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f0000000240)) r6 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0xffff, 0x400000000000200) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f00000002c0)={0x9, 0x2}) 08:16:43 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x200000d8, 0x0) 08:16:43 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x6000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 777.965417][T29832] input: syz0 as /devices/virtual/input/input791 08:16:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffcca, 0x2) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 08:16:43 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x7000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 778.184277][T29828] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 778.225463][T29828] FAT-fs (loop5): Filesystem has been set read-only 08:16:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, 0xffffffffffffffff) [ 778.399000][T30059] input: syz0 as /devices/virtual/input/input793 08:16:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xd00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:43 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x2) 08:16:43 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x8000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) getrandom(0x0, 0xfffffffffffffe9b, 0x2) r1 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x0, 0x2) connect$rxrpc(r1, &(0x7f0000000280)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x5, @remote, 0x8}}, 0x24) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'dummy0\x00', {0x2, 0x4e20, @multicast1}}) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x4, 0x101000) getpeername$llc(r1, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x10) write$cgroup_int(r2, &(0x7f0000000200)=0x598b9b71, 0x12) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x400800) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000180)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r4}) 08:16:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x28, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:44 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x10000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:44 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xee) 08:16:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc9, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, 0xffffffffffffffff) [ 779.176689][T30359] input: syz0 as /devices/virtual/input/input795 08:16:44 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 779.278213][T30171] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 779.341906][T30171] FAT-fs (loop5): Filesystem has been set read-only 08:16:44 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x4000) 08:16:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xf00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 779.569079][T30586] 9pnet_virtio: no channels available for device ./bus [ 779.620639][T30626] 9pnet_virtio: no channels available for device ./bus 08:16:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, 0xffffffffffffffff) 08:16:45 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x20100000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc9, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:45 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xee00) [ 779.877344][T30359] input: syz0 as /devices/virtual/input/input797 08:16:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x29, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:45 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x40000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 780.335762][T30702] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc9, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 780.419611][T30702] FAT-fs (loop5): Filesystem has been set read-only 08:16:45 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x50000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:45 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xee0000) 08:16:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x2000, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 780.796987][T30980] input: syz0 as /devices/virtual/input/input800 08:16:46 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x8cffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:46 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x1000000) 08:16:46 executing program 3 (fault-call:18 fault-nth:0): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:46 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xc0ed0000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x2101, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 781.391804][T30980] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 781.489186][T31243] input: syz0 as /devices/virtual/input/input802 [ 781.541078][T31226] FAULT_INJECTION: forcing a failure. [ 781.541078][T31226] name failslab, interval 1, probability 0, space 0, times 0 [ 781.582961][T30980] FAT-fs (loop0): Filesystem has been set read-only [ 781.682468][T31226] CPU: 0 PID: 31226 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #42 [ 781.690495][T31226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.700555][T31226] Call Trace: [ 781.703864][T31226] dump_stack+0x172/0x1f0 [ 781.708217][T31226] should_fail.cold+0xa/0x15 [ 781.712863][T31226] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 781.718697][T31226] ? ___might_sleep+0x163/0x280 [ 781.723570][T31226] __should_failslab+0x121/0x190 [ 781.728526][T31226] should_failslab+0x9/0x14 [ 781.733044][T31226] kmem_cache_alloc_trace+0x2ce/0x750 [ 781.738448][T31226] alloc_pipe_info+0xb9/0x430 [ 781.743133][T31226] ? mark_held_locks+0xa4/0xf0 [ 781.747912][T31226] splice_direct_to_actor+0x76b/0x970 [ 781.753293][T31226] ? common_file_perm+0x238/0x720 [ 781.758333][T31226] ? generic_pipe_buf_nosteal+0x10/0x10 [ 781.763906][T31226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.770162][T31226] ? do_splice_to+0x180/0x180 [ 781.774859][T31226] ? rw_verify_area+0x126/0x360 [ 781.779754][T31226] do_splice_direct+0x1da/0x2a0 [ 781.784625][T31226] ? splice_direct_to_actor+0x970/0x970 [ 781.790186][T31226] ? retint_kernel+0x2b/0x2b [ 781.794806][T31226] do_sendfile+0x597/0xd00 [ 781.799259][T31226] ? do_compat_pwritev64+0x1c0/0x1c0 [ 781.804566][T31226] ? copy_user_generic_unrolled+0x89/0xc0 [ 781.810295][T31226] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 781.816573][T31226] ? _copy_from_user+0xdd/0x150 [ 781.821461][T31226] __x64_sys_sendfile64+0x15a/0x220 [ 781.826672][T31226] ? __ia32_sys_sendfile+0x230/0x230 08:16:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xc0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:47 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x2000000) 08:16:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:47 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xf6ffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 781.831971][T31226] ? do_syscall_64+0x26/0x680 [ 781.836665][T31226] ? lockdep_hardirqs_on+0x418/0x5d0 [ 781.841963][T31226] ? trace_hardirqs_on+0x67/0x220 [ 781.847011][T31226] do_syscall_64+0xfd/0x680 [ 781.851532][T31226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.857430][T31226] RIP: 0033:0x459519 [ 781.861334][T31226] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 781.880954][T31226] RSP: 002b:00007f5c5f82bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 781.889377][T31226] RAX: ffffffffffffffda RBX: 00007f5c5f82bc90 RCX: 0000000000459519 [ 781.897432][T31226] RDX: 0000000020000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 781.905411][T31226] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 781.913387][T31226] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f5c5f82c6d4 [ 781.913403][T31226] R13: 00000000004c6af0 R14: 00000000004dbd68 R15: 0000000000000005 08:16:47 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xff000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:47 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x40000000) 08:16:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x3d00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:47 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xfffff000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 782.529753][T31594] input: syz0 as /devices/virtual/input/input804 08:16:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:48 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x8cffffff) 08:16:48 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xffffff8c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 783.142415][T31747] input: syz0 as /devices/virtual/input/input807 [ 783.251080][T31594] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 783.291273][T31594] FAT-fs (loop0): Filesystem has been set read-only 08:16:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xc6, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x3f00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:48 executing program 2 (fault-call:3 fault-nth:0): setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:16:48 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xf6ffffff) 08:16:48 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xfffffff6, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:48 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, r0, 0x0) 08:16:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x2, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:49 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x2, r1, r0, 0x0) 08:16:49 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xedc000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:49 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xffffff8c) [ 783.933351][T32066] input: syz0 as /devices/virtual/input/input809 08:16:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x4000, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:49 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xfffffff6) [ 784.562214][T32416] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 784.635891][T32416] FAT-fs (loop0): Filesystem has been set read-only 08:16:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xeb, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:50 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xf0ffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:50 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x3, r1, r0, 0x0) 08:16:50 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xee000000000000) [ 784.907035][T32195] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x4202, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:50 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x5, r1, r0, 0x0) [ 785.007512][T32195] FAT-fs (loop3): Filesystem has been set read-only 08:16:50 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x100000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x3, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:50 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x100000000000000) [ 785.234698][T32648] input: syz0 as /devices/virtual/input/input813 08:16:50 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x200000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:50 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x6, r1, r0, 0x0) 08:16:51 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x200000000000000) [ 785.933981][ T653] input: syz0 as /devices/virtual/input/input816 [ 786.021536][ T404] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 786.118955][ T404] FAT-fs (loop0): Filesystem has been set read-only 08:16:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xf0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:51 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x7, r1, r0, 0x0) 08:16:51 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x300000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6700, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:51 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x4000000000000000) 08:16:51 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x400000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x4, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:51 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x8cffffff00000000) 08:16:51 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x8, r1, r0, 0x0) 08:16:52 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x500000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 786.717959][ T960] input: syz0 as /devices/virtual/input/input818 08:16:52 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6900, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:52 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0xf6ffffff00000000) [ 787.101442][ T971] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 787.145139][ T960] input: syz0 as /devices/virtual/input/input820 [ 787.176796][ T971] FAT-fs (loop0): Filesystem has been set read-only 08:16:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xf4, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:52 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x9, r1, r0, 0x0) 08:16:52 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:52 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x600000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 787.340402][ T1215] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 787.404874][ T1215] FAT-fs (loop5): Filesystem has been set read-only 08:16:52 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001700)={0x0, 0x3, 0x9, 0x3f, 0x1, 0x5, 0xfff, 0x387, {0x0, @in={{0x2, 0x4e21, @local}}, 0x800, 0xffff, 0x3, 0x8, 0x401}}, &(0x7f00000017c0)=0xb0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000001800)={r2, 0x1000, "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"}, &(0x7f0000002840)=0x1008) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./bus\x00', 0x0, 0x10}, 0x10) preadv(r3, &(0x7f0000001680)=[{&(0x7f0000000140)=""/124, 0x7c}, {&(0x7f00000001c0)=""/183, 0xb7}, {&(0x7f0000000280)=""/190, 0xbe}, {&(0x7f0000000340)=""/79, 0x4f}, {&(0x7f00000003c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/245, 0xf5}, {&(0x7f0000000600)=""/85, 0x55}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x8, 0x0) 08:16:52 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x700000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 787.515462][ T1212] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 787.601965][ T1219] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:53 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xa, r1, r0, 0x0) [ 787.669343][ T1215] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:53 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x800000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 787.830313][ T1432] input: syz0 as /devices/virtual/input/input823 08:16:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6b00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:53 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f0000000080)) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:53 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xb, r1, r0, 0x0) [ 788.083742][ T1465] input: syz0 as /devices/virtual/input/input824 08:16:53 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x1000000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0xfd, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:53 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x8, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:53 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x2000000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:53 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x41, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 08:16:54 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xc, r1, r0, 0x0) 08:16:54 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6c00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:54 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x2010000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 788.874513][ T1907] input: syz0 as /devices/virtual/input/input828 08:16:54 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xd, r1, r0, 0x0) 08:16:54 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x101) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0xfff, 0x4a40) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000001c0)=0x1, 0x4) recvfrom(r1, &(0x7f0000000600)=""/4096, 0x1000, 0x2, &(0x7f0000000100)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x121, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:54 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x4000000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:54 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x9, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:54 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xe, r1, r0, 0x0) 08:16:55 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x6e00, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:55 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) setpriority(0xa4fbefccf127b21b, r1, 0x8000) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8, 0x484401) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:55 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x5000000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 789.898774][ T2354] input: syz0 as /devices/virtual/input/input832 08:16:55 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xf, r1, r0, 0x0) 08:16:55 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 790.214631][ T2324] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:55 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, r0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3, 0x18, 0x0) [ 790.338417][ T2324] FAT-fs (loop0): Filesystem has been set read-only 08:16:55 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 790.528629][ T2565] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x242, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:55 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x10, r1, r0, 0x0) [ 790.631063][ T2565] FAT-fs (loop5): Filesystem has been set read-only 08:16:56 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(r0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x6}, @window={0x3, 0x6, 0xde}, @timestamp], 0x4) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 08:16:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xc, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:56 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7000, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:56 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xff00000000000000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) [ 790.992194][ T2887] input: syz0 as /devices/virtual/input/input836 08:16:56 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x11, r1, r0, 0x0) 08:16:56 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0xfffffffffffff000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 08:16:56 executing program 1: r0 = getuid() setreuid(0x0, r0) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r1, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) [ 791.381098][ T2907] input: syz0 as /devices/virtual/input/input837 08:16:56 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=':p\x00', 0x0, 0x0) 08:16:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x300, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:56 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x12, r1, r0, 0x0) 08:16:57 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xff, 0x10600) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000100)) 08:16:57 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7100, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:57 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='\\p\x00', 0x0, 0x0) 08:16:57 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x13, r1, r0, 0x0) [ 792.188768][ T3441] input: syz0 as /devices/virtual/input/input840 08:16:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xd, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:57 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9/\x00', 0x0, 0x0) 08:16:57 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x800) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000100)={'rose0\x00', 0x7}) setresuid(0x0, r0, r0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:57 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x14, r1, r0, 0x0) [ 792.626513][ T3441] input: syz0 as /devices/virtual/input/input842 [ 792.699262][ T3616] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:16:58 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9\\\x00', 0x0, 0x0) 08:16:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x363, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) [ 792.794214][ T3616] FAT-fs (loop5): Filesystem has been set read-only 08:16:58 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7300, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:58 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)) r0 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setreuid(r1, r0) r2 = geteuid() setreuid(r2, r2) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:16:58 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x15, r1, r0, 0x0) 08:16:58 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x02', 0x0, 0x0) [ 793.433478][ T3955] input: syz0 as /devices/virtual/input/input844 08:16:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0xf, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:58 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7ff, 0x40) 08:16:58 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x03', 0x0, 0x0) 08:16:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x484, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:16:59 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x16, r1, r0, 0x0) 08:16:59 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e03036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a5e330e5cf17f7476cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78db721366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7500, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:59 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000100)=0x7) 08:16:59 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x04', 0x0, 0x0) [ 794.308901][ T4369] input: syz0 as /devices/virtual/input/input848 08:16:59 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x17, r1, r0, 0x0) 08:16:59 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x05', 0x0, 0x0) 08:16:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x10, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:16:59 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setresuid(r0, r0, r0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) [ 794.725137][ T4634] input: syz0 as /devices/virtual/input/input851 08:17:00 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x06', 0x0, 0x0) 08:17:00 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7600, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 794.809787][ T4559] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:17:00 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x18, r1, r0, 0x0) [ 794.888608][ T4559] FAT-fs (loop0): Filesystem has been set read-only 08:17:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x5a5, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:17:00 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) recvfrom(r1, &(0x7f0000000600)=""/4096, 0x1000, 0x2, &(0x7f0000000100)=@l2={0x1f, 0x3, {0x100000001, 0x5, 0xffff, 0x10000, 0x7, 0x1}, 0x5d, 0x300000000000}, 0x80) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:17:00 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\a', 0x0, 0x0) 08:17:00 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x19, r1, r0, 0x0) [ 795.540108][ T4941] input: syz0 as /devices/virtual/input/input853 08:17:00 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\b', 0x0, 0x0) 08:17:01 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x24000, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:17:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7800, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) [ 795.761135][ T4706] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 795.841652][ T4706] FAT-fs (loop3): Filesystem has been set read-only [ 796.002010][ T4929] input: syz0 as /devices/virtual/input/input855 08:17:01 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x1b, r1, r0, 0x0) 08:17:01 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x12, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:17:01 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x10', 0x0, 0x0) 08:17:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)) fadvise64(r2, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000)=0x600, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r5, r4, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)) dup2(r4, r5) 08:17:01 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xdc, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x1}, @sack_perm], 0x2) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) [ 796.279088][ T5194] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:17:01 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x1c, r1, r0, 0x0) [ 796.371380][ T5194] FAT-fs (loop5): Filesystem has been set read-only [ 796.431109][ T5167] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 08:17:01 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9pP', 0x0, 0x0) [ 796.619027][ T5376] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 796.718099][ T5382] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 796.803485][ T5397] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 08:17:02 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x121) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)) fadvise64(r3, 0x0, 0x0, 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000)=0x7900, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) dup3(r6, r5, 0x80000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) fgetxattr(r0, &(0x7f0000000340)=@random={'trusted.', 'vboxnet0^#,\x00'}, &(0x7f0000000380)=""/192, 0xc0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) dup2(r5, r6) 08:17:02 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) setreuid(0x0, r0) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setresuid(0x0, r1, r1) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) 08:17:02 executing program 2: setreuid(0x0, 0xee00) r0 = geteuid() r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x1d, r1, r0, 0x0) [ 796.845482][ T5608] input: syz0 as /devices/virtual/input/input858 [ 796.867549][ T5397] FAT-fs (loop0): Filesystem has been set read-only 08:17:02 executing program 4: setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\xf0', 0x0, 0x0) [ 796.944816][ T5395] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 797.051955][ T5397] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 797.158351][ T5623] input: syz0 as /devices/virtual/input/input859 [ 797.246168][ T5608] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 797.340030][ T5630] ------------[ cut here ]------------ [ 797.345853][ T5630] refcount_t: increment on 0; use-after-free. [ 797.346250][ T5630] WARNING: CPU: 0 PID: 5630 at lib/refcount.c:156 refcount_inc_checked+0x61/0x70 [ 797.361305][ T5630] Kernel panic - not syncing: panic_on_warn set ... [ 797.367909][ T5630] CPU: 0 PID: 5630 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #42 [ 797.375805][ T5630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.385872][ T5630] Call Trace: [ 797.389187][ T5630] dump_stack+0x172/0x1f0 [ 797.393528][ T5630] ? refcount_inc_checked+0x10/0x70 [ 797.398738][ T5630] panic+0x2cb/0x744 [ 797.402647][ T5630] ? __warn_printk+0xf3/0xf3 [ 797.407257][ T5630] ? refcount_inc_checked+0x61/0x70 [ 797.412468][ T5630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.418731][ T5630] ? __warn.cold+0x5/0x4d [ 797.423082][ T5630] ? refcount_inc_checked+0x61/0x70 [ 797.428298][ T5630] __warn.cold+0x20/0x4d [ 797.432554][ T5630] ? refcount_inc_checked+0x61/0x70 [ 797.437767][ T5630] report_bug+0x263/0x2b0 [ 797.442114][ T5630] do_error_trap+0x11b/0x200 [ 797.446725][ T5630] do_invalid_op+0x37/0x50 [ 797.451154][ T5630] ? refcount_inc_checked+0x61/0x70 [ 797.456691][ T5630] invalid_op+0x14/0x20 [ 797.460865][ T5630] RIP: 0010:refcount_inc_checked+0x61/0x70 [ 797.466701][ T5630] Code: 1d 9e 5d 48 06 31 ff 89 de e8 3b 56 3c fe 84 db 75 dd e8 f2 54 3c fe 48 c7 c7 e0 9c a4 87 c6 05 7e 5d 48 06 01 e8 fd 8d 0e fe <0f> 0b eb c1 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 41 [ 797.486323][ T5630] RSP: 0018:ffff8880585af8b8 EFLAGS: 00010282 [ 797.492408][ T5630] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 797.500394][ T5630] RDX: 00000000000124f2 RSI: ffffffff815ad926 RDI: ffffed100b0b5f09 [ 797.508382][ T5630] RBP: ffff8880585af8c8 R08: ffff88806425c100 R09: ffff88806425c9a0 [ 797.516369][ T5630] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880638fe878 [ 797.526517][ T5630] R13: 0000000000000000 R14: ffff8880996f0280 R15: ffff88809bb26480 [ 797.534529][ T5630] ? vprintk_func+0x86/0x189 [ 797.539151][ T5630] ? refcount_inc_checked+0x61/0x70 [ 797.544378][ T5630] kobject_get+0x66/0xc0 [ 797.548632][ T5630] cdev_get+0x60/0xb0 [ 797.552628][ T5630] chrdev_open+0xb0/0x6b0 [ 797.556976][ T5630] ? cdev_put.part.0+0x50/0x50 [ 797.561752][ T5630] ? security_file_open+0x87/0x300 [ 797.566887][ T5630] do_dentry_open+0x4df/0x1250 [ 797.571659][ T5630] ? kasan_check_read+0x11/0x20 [ 797.576521][ T5630] ? cdev_put.part.0+0x50/0x50 [ 797.581302][ T5630] ? chown_common+0x5c0/0x5c0 [ 797.585992][ T5630] ? inode_permission+0xb4/0x560 [ 797.590951][ T5630] vfs_open+0xa0/0xd0 [ 797.594944][ T5630] path_openat+0x10e9/0x46d0 [ 797.599552][ T5630] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 797.605399][ T5630] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 797.610802][ T5630] ? __alloc_fd+0x44d/0x560 [ 797.615330][ T5630] do_filp_open+0x1a1/0x280 [ 797.621344][ T5630] ? may_open_dev+0x100/0x100 [ 797.626063][ T5630] ? kasan_check_read+0x11/0x20 [ 797.630930][ T5630] ? do_raw_spin_unlock+0x57/0x270 [ 797.636058][ T5630] ? _raw_spin_unlock+0x2d/0x50 [ 797.640920][ T5630] ? __alloc_fd+0x44d/0x560 [ 797.645456][ T5630] do_sys_open+0x3fe/0x5d0 [ 797.649889][ T5630] ? filp_open+0x80/0x80 [ 797.654153][ T5630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 797.659622][ T5630] ? do_syscall_64+0x26/0x680 [ 797.664312][ T5630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.670396][ T5630] ? do_syscall_64+0x26/0x680 [ 797.675132][ T5630] __x64_sys_open+0x7e/0xc0 [ 797.679651][ T5630] do_syscall_64+0xfd/0x680 [ 797.684178][ T5630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.690079][ T5630] RIP: 0033:0x413401 [ 797.693981][ T5630] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 797.713862][ T5630] RSP: 002b:00007ff0de60c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 797.722294][ T5630] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413401 [ 797.730278][ T5630] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00007ff0de60c850 [ 797.738259][ T5630] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 797.746246][ T5630] R10: 0000000000000000 R11: 0000000000000293 R12: 00007ff0de60d6d4 [ 797.754350][ T5630] R13: 00000000004c86a8 R14: 00000000004df230 R15: 00000000ffffffff [ 797.763693][ T5630] Kernel Offset: disabled [ 797.768106][ T5630] Rebooting in 86400 seconds..