0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 325.303448][T14357] binder: 14351:14357 unknown command 2293760 [ 325.318685][T14357] binder: 14351:14357 ioctl c0306201 200001c0 returned -22 22:40:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000060000000008d", 0xc) [ 325.359540][T14360] binder: 14351:14360 unknown command 2293760 [ 325.407908][T14360] binder: 14351:14360 ioctl c0306201 200001c0 returned -22 22:40:22 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0xfffffffffffffffe, 0x0, 0xffff, 0x8001]}) 22:40:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000ffffff97000000008d", 0xc) [ 325.703110][T14342] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 325.721079][T14380] binder: 14379:14380 unknown command 8960 [ 325.733465][T14377] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 325.751975][T14380] binder: 14379:14380 ioctl c0306201 200001c0 returned -22 [ 325.759416][T14342] FAT-fs (loop5): Filesystem has been set read-only [ 325.774394][T14372] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 325.785001][T14377] FAT-fs (loop1): Filesystem has been set read-only 22:40:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000e0000000008d", 0xc) [ 325.805333][T14389] binder: 14379:14389 unknown command 8960 [ 325.814950][T14372] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 325.830691][T14389] binder: 14379:14389 ioctl c0306201 200001c0 returned -22 [ 325.855785][T14372] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:22 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x8, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 325.943348][T14372] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 326.008948][T14369] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 326.103478][T14405] binder: 14404:14405 unknown command 35 [ 326.140583][T14405] binder: 14404:14405 ioctl c0306201 200001c0 returned -22 22:40:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000003e8000000008d", 0xc) [ 326.221449][T14411] binder: 14404:14411 unknown command 35 [ 326.243891][T14411] binder: 14404:14411 ioctl c0306201 200001c0 returned -22 22:40:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:23 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xa, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000001f4000000008d", 0xc) [ 326.363376][T14422] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 326.469284][T14413] input: syz0 as /devices/virtual/input/input185 [ 326.487210][T14422] FAT-fs (loop5): Filesystem has been set read-only [ 326.504817][T14401] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 326.520762][T14434] binder: 14429:14434 unknown command 0 [ 326.556113][T14441] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000fffffffe000000008d", 0xc) [ 326.589437][T14434] binder: 14429:14434 ioctl c0306201 200001c0 returned -22 [ 326.605702][T14423] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 326.626687][T14401] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 326.634356][T14441] FAT-fs (loop3): Filesystem has been set read-only [ 326.650643][T14448] binder: 14429:14448 unknown command 0 [ 326.688655][T14448] binder: 14429:14448 ioctl c0306201 200001c0 returned -22 [ 326.749416][T14423] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 326.774837][T14400] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:23 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x12, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 326.829641][T14423] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000097ffffff000000008d", 0xc) [ 326.878239][T14459] binder: 14458:14459 unknown command 0 [ 326.903443][T14423] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 326.926790][T14459] binder: 14458:14459 ioctl c0306201 200001c0 returned -22 [ 326.949591][T14421] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 326.974426][T14463] binder: 14458:14463 unknown command 0 [ 327.032357][T14463] binder: 14458:14463 ioctl c0306201 200001c0 returned -22 22:40:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000feffffff000000008d", 0xc) 22:40:24 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x23, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 327.204745][T14471] input: syz0 as /devices/virtual/input/input187 [ 327.263365][T14480] binder: 14479:14480 unknown command 0 [ 327.279963][T14480] binder: 14479:14480 ioctl c0306201 200001c0 returned -22 22:40:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 327.305234][T14487] binder: 14479:14487 unknown command 0 [ 327.333767][T14487] binder: 14479:14487 ioctl c0306201 200001c0 returned -22 22:40:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000018d", 0xc) 22:40:24 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x48, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 327.588989][T14506] binder: 14502:14506 unknown command 0 [ 327.609893][T14506] binder: 14502:14506 ioctl c0306201 200001c0 returned -22 [ 327.626039][T14500] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 327.648352][T14493] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 327.657642][T14500] FAT-fs (loop1): Filesystem has been set read-only [ 327.665923][T14493] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 0) [ 327.678637][T14500] input: syz0 as /devices/virtual/input/input189 22:40:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000048d", 0xc) [ 327.816792][T14492] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:24 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4c, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 327.972293][T14522] binder: 14521:14522 unknown command 0 [ 327.981232][T14522] binder: 14521:14522 ioctl c0306201 200001c0 returned -22 [ 328.013789][T14523] binder: 14521:14523 unknown command 0 [ 328.026863][T14523] binder: 14521:14523 ioctl c0306201 200001c0 returned -22 22:40:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000078d", 0xc) 22:40:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x60, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 328.299180][T14540] binder: 14538:14540 unknown command 0 [ 328.305619][T14542] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.331796][T14544] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.336789][T14540] binder: 14538:14540 ioctl c0306201 200001c0 returned -22 22:40:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 328.340636][T14542] FAT-fs (loop5): Filesystem has been set read-only [ 328.359187][T14547] input: syz0 as /devices/virtual/input/input190 [ 328.386325][T14527] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000a8d", 0xc) [ 328.398671][T14544] FAT-fs (loop1): Filesystem has been set read-only [ 328.440383][T14557] binder: 14538:14557 unknown command 0 [ 328.450018][T14530] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.483231][T14548] input: syz0 as /devices/virtual/input/input191 [ 328.509909][T14557] binder: 14538:14557 ioctl c0306201 200001c0 returned -22 [ 328.519823][T14527] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.530355][T14564] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.545716][T14530] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.568717][T14549] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x68, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000e8d", 0xc) [ 328.602445][T14527] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.612191][T14564] FAT-fs (loop3): Filesystem has been set read-only [ 328.628433][T14527] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.644677][T14549] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 0) [ 328.717692][T14529] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 328.729224][T14526] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 328.759907][T14578] binder: 14574:14578 unknown command 0 [ 328.772180][T14578] binder: 14574:14578 ioctl c0306201 200001c0 returned -22 [ 328.819877][T14579] binder: 14574:14579 unknown command 0 [ 328.826811][T14546] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 328.859629][T14579] binder: 14574:14579 ioctl c0306201 200001c0 returned -22 22:40:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000208d", 0xc) 22:40:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6c, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000408d", 0xc) [ 328.995252][T14593] binder: 14587:14593 unknown command 0 [ 329.010870][T14593] binder: 14587:14593 ioctl c0306201 200001c0 returned -22 [ 329.036806][T14595] binder: 14587:14595 unknown command 0 [ 329.042669][T14595] binder: 14587:14595 ioctl c0306201 200001c0 returned -22 22:40:26 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x74, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 329.169242][T14605] input: syz0 as /devices/virtual/input/input192 22:40:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000608d", 0xc) [ 329.289567][T14615] binder: 14614:14615 unknown command 0 [ 329.345322][T14615] binder: 14614:14615 ioctl c0306201 200001c0 returned -22 [ 329.435273][T14631] binder: 14614:14631 unknown command 0 22:40:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 329.509015][T14622] input: syz0 as /devices/virtual/input/input194 [ 329.539671][T14631] binder: 14614:14631 ioctl c0306201 200001c0 returned -22 22:40:27 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7a, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 330.173446][T14642] binder: 14641:14642 unknown command 0 [ 330.180858][T14642] binder: 14641:14642 ioctl c0306201 200001c0 returned -22 22:40:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000ffffff978d", 0xc) 22:40:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:27 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x300, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000e08d", 0xc) [ 330.327019][T14657] binder: 14653:14657 unknown command 0 [ 330.332714][T14657] binder: 14653:14657 ioctl c0306201 200001c0 returned -22 [ 330.372228][T14658] binder: 14653:14658 unknown command 0 [ 330.442659][T14658] binder: 14653:14658 ioctl c0306201 200001c0 returned -22 [ 330.507797][T14672] input: syz0 as /devices/virtual/input/input195 22:40:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:27 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x500, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000003e88d", 0xc) [ 330.814575][T14680] input: syz0 as /devices/virtual/input/input197 [ 330.834203][T14691] binder: 14686:14691 unknown command 0 22:40:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 330.867924][T14691] binder: 14686:14691 ioctl c0306201 200001c0 returned -22 [ 330.920573][T14696] binder: 14686:14696 unknown command 0 [ 330.978963][T14696] binder: 14686:14696 ioctl c0306201 200001c0 returned -22 22:40:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000001f48d", 0xc) 22:40:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:28 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x600, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000fffffffe8d", 0xc) 22:40:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 331.497531][T14711] binder: 14709:14711 unknown command 0 [ 331.503132][T14711] binder: 14709:14711 ioctl c0306201 200001c0 returned -22 [ 331.521327][T14715] binder: 14709:14715 unknown command 0 22:40:28 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x700, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 331.550114][T14715] binder: 14709:14715 ioctl c0306201 200001c0 returned -22 [ 331.614197][T14717] input: syz0 as /devices/virtual/input/input198 22:40:28 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfd06) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r0, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000040000000000008d", 0xc) [ 331.792416][T14737] binder: 14734:14737 unknown command 0 22:40:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 331.895773][T14737] binder: 14734:14737 ioctl c0306201 200001c0 returned -22 [ 331.937726][T14747] binder: 14734:14747 unknown command 0 [ 331.943534][T14747] binder: 14734:14747 ioctl c0306201 200001c0 returned -22 22:40:28 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfd06) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r0, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 331.994075][T14736] input: syz0 as /devices/virtual/input/input200 22:40:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000070000000000008d", 0xc) 22:40:29 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xa00, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:29 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfd06) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r0, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 332.340423][T14755] input: syz0 as /devices/virtual/input/input201 22:40:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000a0000000000008d", 0xc) [ 332.417007][T14768] binder: 14766:14768 unknown command 0 [ 332.459125][T14768] binder: 14766:14768 ioctl c0306201 200001c0 returned -22 [ 332.508749][T14773] binder: 14766:14773 unknown command 0 [ 332.581029][T14773] binder: 14766:14773 ioctl c0306201 200001c0 returned -22 22:40:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000e0000000000008d", 0xc) 22:40:29 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xb63, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 332.780970][T14786] binder: 14780:14786 unknown command 0 22:40:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000600000000000008d", 0xc) [ 332.826687][T14786] binder: 14780:14786 ioctl c0306201 200001c0 returned -22 [ 332.863235][T14795] binder: 14780:14795 unknown command 0 [ 333.002658][T14795] binder: 14780:14795 ioctl c0306201 200001c0 returned -22 22:40:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:30 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xc63, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000e00000000000008d", 0xc) [ 333.165142][T14808] input: syz0 as /devices/virtual/input/input203 [ 333.237286][T14811] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 333.314687][T14815] input: syz0 as /devices/virtual/input/input204 [ 333.350198][T14827] binder: 14821:14827 unknown command 0 [ 333.370130][T14811] FAT-fs (loop1): Filesystem has been set read-only 22:40:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000f40100000000008d", 0xc) [ 333.413865][T14827] binder: 14821:14827 ioctl c0306201 200001c0 returned -22 22:40:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 333.512780][T14831] binder: 14821:14831 unknown command 0 [ 333.549518][T14831] binder: 14821:14831 ioctl c0306201 200001c0 returned -22 22:40:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000e80300000000008d", 0xc) 22:40:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:30 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xd63, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 333.866873][T14846] binder: 14843:14846 unknown command 0 [ 333.890117][T14846] binder: 14843:14846 ioctl c0306201 200001c0 returned -22 22:40:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000700000000008d", 0xc) [ 333.957374][T14860] binder: 14843:14860 unknown command 0 22:40:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 334.002564][T14857] input: syz0 as /devices/virtual/input/input205 [ 334.036249][T14860] binder: 14843:14860 ioctl c0306201 200001c0 returned -22 22:40:31 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x1200, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000a00000000008d", 0xc) 22:40:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 334.269106][T14879] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 334.300304][T14870] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 334.361465][T14879] FAT-fs (loop5): Filesystem has been set read-only [ 334.378726][T14883] binder: 14881:14883 unknown command 0 [ 334.404518][T14883] binder: 14881:14883 ioctl c0306201 200001c0 returned -22 [ 334.487376][T14882] input: syz0 as /devices/virtual/input/input207 [ 334.497808][T14891] binder: 14881:14891 unknown command 0 [ 334.548576][T14891] binder: 14881:14891 ioctl c0306201 200001c0 returned -22 [ 334.553942][T14870] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000e00000000008d", 0xc) 22:40:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 334.700009][T14897] input: syz0 as /devices/virtual/input/input208 [ 334.913964][T14863] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:32 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x2000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000002000000000008d", 0xc) 22:40:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 335.050539][T14920] binder: 14919:14920 unknown command 0 [ 335.074817][T14920] binder: 14919:14920 ioctl c0306201 200001c0 returned -22 22:40:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000004000000000008d", 0xc) [ 335.154627][T14933] binder: 14919:14933 unknown command 0 [ 335.193768][T14933] binder: 14919:14933 ioctl c0306201 200001c0 returned -22 22:40:32 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x2300, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 335.356511][T14931] input: syz0 as /devices/virtual/input/input210 22:40:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000006000000000008d", 0xc) [ 335.493415][T14939] input: syz0 as /devices/virtual/input/input211 [ 335.519213][T14954] binder: 14952:14954 unknown command 0 22:40:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 335.575390][T14954] binder: 14952:14954 ioctl c0306201 200001c0 returned -22 [ 335.666960][T14962] binder: 14952:14962 unknown command 0 22:40:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 335.722552][T14962] binder: 14952:14962 ioctl c0306201 200001c0 returned -22 [ 336.002478][T14972] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 336.019272][T14972] FAT-fs (loop3): Filesystem has been set read-only [ 336.027404][T14972] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 336.040177][T14972] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 336.050365][T14972] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000e000000000008d", 0xc) 22:40:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:33 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x3f00, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 336.141862][T14971] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000003e800000000008d", 0xc) 22:40:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 336.198084][T14988] binder: 14980:14988 unknown command 0 [ 336.256082][T14988] binder: 14980:14988 ioctl c0306201 200001c0 returned -22 [ 336.317535][T14995] binder: 14980:14995 unknown command 0 [ 336.346702][T14995] binder: 14980:14995 ioctl c0306201 200001c0 returned -22 22:40:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000001f400000000008d", 0xc) [ 336.435003][T14993] input: syz0 as /devices/virtual/input/input213 22:40:33 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 336.574819][T15006] input: syz0 as /devices/virtual/input/input214 22:40:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000010000008d", 0xc) 22:40:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 336.690836][T15024] binder: 15023:15024 unknown command 0 22:40:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 336.754346][T15024] binder: 15023:15024 ioctl c0306201 200001c0 returned -22 22:40:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000040000008d", 0xc) [ 336.798543][T15028] binder: 15023:15028 unknown command 0 [ 336.822858][T15028] binder: 15023:15028 ioctl c0306201 200001c0 returned -22 22:40:34 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4800, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 337.090253][T15043] binder: 15042:15043 unknown command 0 [ 337.134121][T15043] binder: 15042:15043 ioctl c0306201 200001c0 returned -22 22:40:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000070000008d", 0xc) 22:40:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:34 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4c00, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 337.399039][T15062] binder: 15059:15062 unknown command 0 22:40:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000a0000008d", 0xc) [ 337.455876][T15062] binder: 15059:15062 ioctl c0306201 200001c0 returned -22 [ 337.506967][T15071] binder: 15059:15071 unknown command 0 [ 337.516161][T15071] binder: 15059:15071 ioctl c0306201 200001c0 returned -22 [ 337.548990][T15064] input: syz0 as /devices/virtual/input/input217 22:40:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:34 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 337.751958][T15069] input: syz0 as /devices/virtual/input/input218 [ 337.787427][T15087] binder: 15085:15087 unknown command 0 22:40:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000e0000008d", 0xc) 22:40:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 337.825669][T15087] binder: 15085:15087 ioctl c0306201 200001c0 returned -22 22:40:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:35 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x630b, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000200000008d", 0xc) 22:40:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 338.388239][T15113] binder: 15109:15113 unknown command 0 [ 338.406013][T15113] binder: 15109:15113 ioctl c0306201 200001c0 returned -22 22:40:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000400000008d", 0xc) [ 338.430527][T15117] binder: 15109:15117 unknown command 0 [ 338.442958][T15117] binder: 15109:15117 ioctl c0306201 200001c0 returned -22 22:40:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:35 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x630c, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 338.574065][T15127] input: syz0 as /devices/virtual/input/input220 [ 338.792663][T15141] binder: 15140:15141 unknown command 0 [ 338.799213][T15124] input: syz0 as /devices/virtual/input/input221 22:40:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000600000008d", 0xc) 22:40:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 338.837820][T15141] binder: 15140:15141 ioctl c0306201 200001c0 returned -22 [ 338.905382][T15149] binder: 15140:15149 unknown command 0 [ 338.928910][T15149] binder: 15140:15149 ioctl c0306201 200001c0 returned -22 22:40:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000ffffff970000008d", 0xc) 22:40:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:36 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x630d, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000e00000008d", 0xc) 22:40:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 339.374692][T15178] binder: 15177:15178 unknown command 0 [ 339.402440][T15178] binder: 15177:15178 ioctl c0306201 200001c0 returned -22 22:40:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000003e80000008d", 0xc) [ 339.477811][T15185] binder: 15177:15185 unknown command 0 [ 339.483390][T15167] input: syz0 as /devices/virtual/input/input223 [ 339.527039][T15185] binder: 15177:15185 ioctl c0306201 200001c0 returned -22 [ 339.805286][T15192] input: syz0 as /devices/virtual/input/input224 22:40:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:36 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6800, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000001f40000008d", 0xc) 22:40:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 339.959627][T15210] binder: 15206:15210 unknown command 0 [ 339.993763][T15210] binder: 15206:15210 ioctl c0306201 200001c0 returned -22 22:40:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000fffffffe0000008d", 0xc) [ 340.063356][T15213] binder: 15206:15213 unknown command 0 22:40:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 340.133947][T15213] binder: 15206:15213 ioctl c0306201 200001c0 returned -22 22:40:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000097ffffff0000008d", 0xc) [ 340.420553][T15234] input: syz0 as /devices/virtual/input/input226 22:40:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:37 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6c00, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 340.552645][T15247] binder: 15245:15247 unknown command 0 [ 340.558958][T15247] binder: 15245:15247 ioctl c0306201 200001c0 returned -22 [ 340.576133][T15248] binder: 15245:15248 unknown command 0 [ 340.582664][T15248] binder: 15245:15248 ioctl c0306201 200001c0 returned -22 [ 340.800467][T15252] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 340.823507][T15252] FAT-fs (loop1): Filesystem has been set read-only [ 340.830313][T15255] input: syz0 as /devices/virtual/input/input227 [ 340.833003][T15252] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000feffffff0000008d", 0xc) 22:40:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:37 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7400, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 340.879516][T15252] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 340.889581][T15252] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 340.960632][T15264] binder: 15260:15264 unknown command 0 [ 340.968183][T15251] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 340.977552][T15264] binder: 15260:15264 ioctl c0306201 200001c0 returned -22 22:40:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 341.002600][T15269] binder: 15260:15269 unknown command 0 [ 341.010781][T15269] binder: 15260:15269 ioctl c0306201 200001c0 returned -22 22:40:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:38 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7a00, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000400000000008d", 0xc) 22:40:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 341.242515][T15280] binder: 15278:15280 unknown command 0 22:40:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000700000000008d", 0xc) [ 341.294319][T15280] binder: 15278:15280 ioctl c0306201 200001c0 returned -22 22:40:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 341.361580][T15295] binder: 15278:15295 unknown command 0 [ 341.383530][T15295] binder: 15278:15295 ioctl c0306201 200001c0 returned -22 22:40:38 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xff00, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000a00000000008d", 0xc) [ 341.559168][T15299] input: syz0 as /devices/virtual/input/input229 [ 341.573824][T15300] input: syz0 as /devices/virtual/input/input230 22:40:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:38 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x634040, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 342.140564][T15336] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 342.141972][T15332] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 342.159132][T15336] FAT-fs (loop3): Filesystem has been set read-only [ 342.166470][T15332] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000e00000000008d", 0xc) 22:40:39 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x1000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 342.244087][T15331] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 342.320864][T15349] binder: BINDER_SET_CONTEXT_MGR already set 22:40:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000006000000000008d", 0xc) 22:40:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 342.362382][T15349] binder: 15341:15349 ioctl 40046207 0 returned -16 22:40:39 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x16230c0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 342.529549][T15351] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 342.559998][T15353] input: syz0 as /devices/virtual/input/input232 22:40:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000e000000000008d", 0xc) [ 342.584731][T15356] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 342.642662][T15351] FAT-fs (loop1): Filesystem has been set read-only [ 342.716734][T15356] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:39 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x1634040, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 342.811809][T15356] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 342.878921][T15356] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 342.927650][T15347] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000f401000000008d", 0xc) 22:40:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:40 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x2000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000e803000000008d", 0xc) 22:40:40 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x2630440, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 343.368384][T15411] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 343.405443][T15412] FAT-fs (loop5): bogus number of reserved sectors 22:40:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 343.432009][T15401] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 343.460311][T15412] FAT-fs (loop5): Can't find a valid FAT filesystem [ 343.483868][T15415] input: syz0 as /devices/virtual/input/input235 [ 343.502789][T15401] FAT-fs (loop1): Filesystem has been set read-only [ 343.528570][T15401] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 343.606646][T15401] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 343.644399][T15412] input: syz0 as /devices/virtual/input/input236 22:40:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000007000000008d", 0xc) 22:40:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 343.668882][T15401] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:40 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x3000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 343.718619][T15400] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000a000000008d", 0xc) 22:40:41 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x3630840, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000e000000008d", 0xc) [ 344.452779][T15466] input: syz0 as /devices/virtual/input/input238 [ 344.468249][T15469] FAT-fs (loop5): bogus number of reserved sectors [ 344.490643][T15469] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:41 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000020000000008d", 0xc) [ 344.659578][T15480] input: syz0 as /devices/virtual/input/input239 22:40:41 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4630440, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000040000000008d", 0xc) 22:40:42 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x5000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000060000000008d", 0xc) 22:40:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 345.510342][T15513] input: syz0 as /devices/virtual/input/input241 [ 345.517119][T15529] FAT-fs (loop5): bogus number of reserved sectors [ 345.536223][T15529] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:42 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000e0000000008d", 0xc) 22:40:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 345.708599][T15529] input: syz0 as /devices/virtual/input/input242 22:40:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000003e8000000008d", 0xc) 22:40:43 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000001f4000000008d", 0xc) [ 346.574983][T15578] FAT-fs (loop5): bogus number of reserved sectors [ 346.620790][T15578] FAT-fs (loop5): Can't find a valid FAT filesystem [ 346.655542][T15575] input: syz0 as /devices/virtual/input/input244 22:40:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:43 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7630440, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000100008d", 0xc) 22:40:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) [ 346.762680][T15578] input: syz0 as /devices/virtual/input/input245 22:40:43 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x8000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:44 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x8631040, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000400008d", 0xc) 22:40:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000700008d", 0xc) [ 347.566975][T15636] FAT-fs (loop5): bogus number of reserved sectors [ 347.603813][T15636] FAT-fs (loop5): Can't find a valid FAT filesystem [ 347.615243][T15635] input: syz0 as /devices/virtual/input/input247 22:40:44 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x9631040, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000a00008d", 0xc) 22:40:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 347.842027][T15645] input: syz0 as /devices/virtual/input/input248 22:40:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:45 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xa000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000e00008d", 0xc) 22:40:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000002000008d", 0xc) 22:40:45 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xa630840, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 348.591819][T15691] FAT-fs (loop5): bogus number of reserved sectors [ 348.610347][T15691] FAT-fs (loop5): Can't find a valid FAT filesystem [ 348.627497][T15690] input: syz0 as /devices/virtual/input/input250 22:40:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000004000008d", 0xc) 22:40:45 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xb630000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 348.907895][T15694] input: syz0 as /devices/virtual/input/input251 22:40:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000006000008d", 0xc) 22:40:46 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xc630000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:46 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xd630000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000ffffff9700008d", 0xc) [ 349.559829][T15741] FAT-fs (loop5): bogus number of reserved sectors [ 349.667529][T15741] FAT-fs (loop5): Can't find a valid FAT filesystem [ 349.677173][T15746] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 349.748648][T15739] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 349.763769][T15746] FAT-fs (loop1): Filesystem has been set read-only [ 349.781460][T15757] input: syz0 as /devices/virtual/input/input253 [ 349.811616][T15758] input: syz0 as /devices/virtual/input/input254 22:40:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 349.881191][T15739] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{0x0, 0xca, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0xfffffed8}], 0x1}}], 0x1, 0x0, 0x0) 22:40:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000e000008d", 0xc) 22:40:46 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xe630c40, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 349.965182][T15739] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 350.037147][T15739] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 350.175599][T15737] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 22:40:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000003e800008d", 0xc) 22:40:47 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xf630c40, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 22:40:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000001f400008d", 0xc) 22:40:47 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x10630840, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 350.547649][T15802] FAT-fs (loop5): bogus number of reserved sectors [ 350.604072][T15804] input: syz0 as /devices/virtual/input/input256 [ 350.627947][T15802] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 22:40:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000fffffffe00008d", 0xc) [ 350.858167][T15777] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 350.873144][T15777] FAT-fs (loop3): Filesystem has been set read-only 22:40:47 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x11634840, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 350.930187][T15808] input: syz0 as /devices/virtual/input/input257 22:40:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540), 0x0, 0x0, 0x0) 22:40:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000097ffffff00008d", 0xc) 22:40:48 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x12000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540), 0x0, 0x0, 0x0) 22:40:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000feffffff00008d", 0xc) 22:40:48 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x12634840, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 351.646226][T15860] input: syz0 as /devices/virtual/input/input259 [ 351.688254][T15868] FAT-fs (loop5): bogus number of reserved sectors [ 351.763163][T15868] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540), 0x0, 0x0, 0x0) 22:40:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000004000000008d", 0xc) 22:40:48 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x20000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 351.931585][T15873] input: syz0 as /devices/virtual/input/input260 22:40:49 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x23000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:40:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000007000000008d", 0xc) 22:40:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:40:49 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x3f000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000a000000008d", 0xc) 22:40:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:40:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000e000000008d", 0xc) 22:40:49 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 352.690964][T15921] FAT-fs (loop5): bogus number of reserved sectors [ 352.779813][T15921] FAT-fs (loop5): Can't find a valid FAT filesystem [ 352.792225][T15925] input: syz0 as /devices/virtual/input/input262 22:40:50 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:50 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40046302, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, &(0x7f0000000f40)}}], 0x1, 0x0, 0x0) 22:40:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000060000000008d", 0xc) [ 353.102007][T15921] input: syz0 as /devices/virtual/input/input263 [ 353.408199][T15960] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 353.433001][T15955] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 353.442878][T15960] FAT-fs (loop3): Filesystem has been set read-only 22:40:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 353.460350][T15955] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 353.496374][T15955] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 353.515110][T15955] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 353.545343][T15953] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, &(0x7f0000000f40)}}], 0x1, 0x0, 0x0) 22:40:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000e0000000008d", 0xc) 22:40:50 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40046304, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:50 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, &(0x7f0000000f40)}}], 0x1, 0x0, 0x0) 22:40:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000f4010000008d", 0xc) 22:40:50 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40046307, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 353.826526][T15988] FAT-fs (loop5): bogus number of reserved sectors [ 353.887909][T15978] input: syz0 as /devices/virtual/input/input265 [ 353.895239][T15988] FAT-fs (loop5): Can't find a valid FAT filesystem [ 353.901438][T15994] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, &(0x7f0000000f40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 22:40:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000e8030000008d", 0xc) [ 354.032982][T15985] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:51 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40086303, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 354.075910][T15994] FAT-fs (loop3): Filesystem has been set read-only [ 354.097217][T15985] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 354.157496][T15985] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 354.235821][T15988] input: syz0 as /devices/virtual/input/input267 [ 354.243220][T15985] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 354.296863][T15984] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:51 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, &(0x7f0000000f40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 22:40:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000070000008d", 0xc) 22:40:51 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4008630a, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 354.701079][T16039] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 354.720577][T16025] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000a0000008d", 0xc) 22:40:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r1, &(0x7f0000001540)=[{{0x0, 0x0, &(0x7f0000000f40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 354.797794][T16039] FAT-fs (loop1): Filesystem has been set read-only 22:40:51 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40086310, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 354.841290][T16025] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 354.892557][T16047] input: syz0 as /devices/virtual/input/input269 [ 354.964398][T16048] FAT-fs (loop5): bogus number of reserved sectors [ 354.968526][T16025] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 355.031437][T16048] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:52 executing program 2: 22:40:52 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x400c630e, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000e0000008d", 0xc) [ 355.138802][T16054] input: syz0 as /devices/virtual/input/input270 [ 355.161486][T16025] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 355.246745][T16024] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:52 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x400c630f, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:52 executing program 2: 22:40:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000200000008d", 0xc) 22:40:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:52 executing program 2: 22:40:52 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40106308, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000400000008d", 0xc) [ 355.634426][T16098] FAT-fs (loop5): bogus number of reserved sectors [ 355.694516][T16098] FAT-fs (loop5): Can't find a valid FAT filesystem [ 355.762174][T16086] input: syz0 as /devices/virtual/input/input271 22:40:52 executing program 2: 22:40:52 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40106309, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000600000008d", 0xc) [ 355.955888][T16106] input: syz0 as /devices/virtual/input/input273 22:40:53 executing program 2: 22:40:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 356.393012][T16142] input: syz0 as /devices/virtual/input/input274 22:40:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:53 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40406300, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:53 executing program 2: 22:40:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000e00000008d", 0xc) 22:40:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e8bcfec7be070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x1, 0x0) write$nbd(r1, &(0x7f0000000200)={0x6000000, 0x0, 0x0, 0x0, 0x4, "a3ef41749fa527ab78fc57f180bd82099cbab35a2fdbede5fbb11bedfb1f8cd557b0bdfcd7f42f63af872a0a11e32f7a06bebb02f6b78b1ea525f6ba185947306a84eb578d5d1004425fc78b343624c6c5e7be78ab9406a3"}, 0x68) 22:40:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000003e80000008d", 0xc) [ 356.612269][T16155] FAT-fs (loop5): bogus number of reserved sectors [ 356.659047][T16155] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:53 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40406301, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000001f40000008d", 0xc) 22:40:53 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1000000000002) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 356.890315][T16159] input: syz0 as /devices/virtual/input/input275 22:40:54 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40486311, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000001008d", 0xc) 22:40:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:54 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x40486312, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000004008d", 0xc) 22:40:54 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x48000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 357.551480][T16215] input: syz0 as /devices/virtual/input/input278 22:40:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000007008d", 0xc) 22:40:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:54 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4c000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 357.721347][T16230] FAT-fs (loop5): bogus number of reserved sectors [ 357.762277][T16230] FAT-fs (loop5): Can't find a valid FAT filesystem [ 357.994669][T16237] input: syz0 as /devices/virtual/input/input279 22:40:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000000a008d", 0xc) 22:40:55 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x60000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 358.522723][T16274] input: syz0 as /devices/virtual/input/input281 22:40:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000000e008d", 0xc) 22:40:55 executing program 2: socket$inet6(0xa, 0x3, 0x2) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:55 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x68000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:55 executing program 2: socket$inet6(0xa, 0x3, 0x2) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000020008d", 0xc) [ 358.839972][T16289] FAT-fs (loop5): bogus number of reserved sectors 22:40:55 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6c000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 358.889670][T16289] FAT-fs (loop5): Can't find a valid FAT filesystem [ 359.118971][T16294] input: syz0 as /devices/virtual/input/input282 22:40:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:56 executing program 2: socket$inet6(0xa, 0x3, 0x2) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000040008d", 0xc) 22:40:56 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x74000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000060008d", 0xc) 22:40:56 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:56 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7a000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 359.599548][T16335] FAT-fs (loop5): bogus number of reserved sectors [ 359.634047][T16331] input: syz0 as /devices/virtual/input/input284 22:40:56 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000ffffff97008d", 0xc) [ 359.683895][T16335] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 359.799374][T16345] input: syz0 as /devices/virtual/input/input285 [ 360.067672][T16365] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.090509][T16361] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.108123][T16365] FAT-fs (loop3): Filesystem has been set read-only [ 360.121204][T16361] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.138342][T16361] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.148649][T16361] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.217211][T16360] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:57 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:57 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xc0306201, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000e0008d", 0xc) 22:40:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000003e8008d", 0xc) 22:40:57 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xff000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:57 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 360.516950][T16381] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.564990][T16372] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 360.622005][T16381] FAT-fs (loop3): Filesystem has been set read-only [ 360.659671][T16393] FAT-fs (loop5): bogus number of reserved sectors [ 360.662577][T16372] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 22:40:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000001f4008d", 0xc) [ 360.706922][T16387] input: syz0 as /devices/virtual/input/input287 22:40:57 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x63404000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 360.779099][T16372] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 0) [ 360.787821][T16393] FAT-fs (loop5): Can't find a valid FAT filesystem 22:40:57 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 360.893919][T16369] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 360.941146][T16393] input: syz0 as /devices/virtual/input/input288 22:40:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000fffffffe008d", 0xc) 22:40:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:58 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x100000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:58 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:58 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x16230c000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000097ffffff008d", 0xc) 22:40:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 361.631042][T16459] input: syz0 as /devices/virtual/input/input290 22:40:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000feffffff008d", 0xc) [ 361.736743][T16467] FAT-fs (loop5): invalid media value (0x00) 22:40:58 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x163404000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 361.825855][T16467] FAT-fs (loop5): Can't find a valid FAT filesystem [ 361.991556][T16475] input: syz0 as /devices/virtual/input/input291 22:40:59 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x200000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000040000008d", 0xc) 22:40:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:40:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:40:59 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x263044000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:59 executing program 2: socket$inet6(0xa, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 362.543345][T16516] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000070000008d", 0xc) 22:40:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 362.594252][T16504] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 362.660136][T16516] FAT-fs (loop3): Filesystem has been set read-only 22:40:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000a0000008d", 0xc) 22:40:59 executing program 2: socket$inet6(0xa, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 362.702943][T16515] input: syz0 as /devices/virtual/input/input292 [ 362.743502][T16504] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 362.825253][T16539] FAT-fs (loop5): invalid media value (0x00) 22:40:59 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x300000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:40:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000e0000008d", 0xc) [ 362.873761][T16539] FAT-fs (loop5): Can't find a valid FAT filesystem [ 362.885504][T16504] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:40:59 executing program 2: socket$inet6(0xa, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 362.958323][T16504] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:41:00 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x363084000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 363.094249][T16498] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 363.113438][T16539] input: syz0 as /devices/virtual/input/input293 22:41:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000600000008d", 0xc) 22:41:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:00 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x400000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 363.461952][T16571] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 363.496634][T16566] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:41:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 363.523213][T16566] FAT-fs (loop3): Filesystem has been set read-only 22:41:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000e00000008d", 0xc) [ 363.581443][T16580] FAT-fs (loop5): invalid media value (0x00) [ 363.617391][T16566] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:41:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 363.696096][T16580] FAT-fs (loop5): Can't find a valid FAT filesystem 22:41:00 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x463044000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000f40100008d", 0xc) [ 363.794244][T16565] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 22:41:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 363.927325][T16602] input: syz0 as /devices/virtual/input/input294 22:41:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 364.012467][T16600] input: syz0 as /devices/virtual/input/input295 22:41:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000e80300008d", 0xc) 22:41:01 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x500000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000700008d", 0xc) 22:41:01 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x600000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 364.640771][T16645] FAT-fs (loop5): invalid media value (0x00) [ 364.767797][T16645] FAT-fs (loop5): Can't find a valid FAT filesystem [ 364.881504][T16664] input: syz0 as /devices/virtual/input/input297 22:41:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:01 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x700000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 364.989890][T16655] input: syz0 as /devices/virtual/input/input298 22:41:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000a00008d", 0xc) 22:41:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:02 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x763044000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000e00008d", 0xc) 22:41:02 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:02 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x800000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000002000008d", 0xc) 22:41:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0b") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 365.677477][T16701] input: syz0 as /devices/virtual/input/input300 22:41:02 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x863104000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 365.789849][T16722] FAT-fs (loop5): invalid media value (0x00) [ 365.853513][T16722] FAT-fs (loop5): Can't find a valid FAT filesystem [ 366.095414][T16722] input: syz0 as /devices/virtual/input/input301 22:41:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000004000008d", 0xc) 22:41:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0b") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:03 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x963104000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0b") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000006000008d", 0xc) 22:41:03 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:03 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xa00000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7b") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000e000008d", 0xc) [ 366.547101][T16765] FAT-fs (loop5): invalid media value (0x00) 22:41:03 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xa63084000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7b") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 366.704682][T16765] FAT-fs (loop5): Can't find a valid FAT filesystem 22:41:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000003e800008d", 0xc) [ 366.894226][T16765] input: syz0 as /devices/virtual/input/input304 22:41:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7b") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 366.954098][T16780] input: syz0 as /devices/virtual/input/input303 22:41:04 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xb63000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000001f400008d", 0xc) 22:41:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be0") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:04 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000018d", 0xc) 22:41:04 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xc63000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be0") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000048d", 0xc) 22:41:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be0") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:04 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xd63000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 367.622905][T16831] FAT-fs (loop5): invalid media value (0x00) [ 367.667225][T16831] FAT-fs (loop5): Can't find a valid FAT filesystem [ 367.803811][T16843] input: syz0 as /devices/virtual/input/input306 22:41:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x0, 0x0, 0x0) 22:41:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000078d", 0xc) [ 367.848965][T16845] input: syz0 as /devices/virtual/input/input307 22:41:05 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xe630c4000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:05 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xf630c4000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x0, 0x0, 0x0) 22:41:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000a8d", 0xc) 22:41:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x0, 0x0, 0x0) 22:41:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000e8d", 0xc) 22:41:05 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x1063084000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x0, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 368.691794][T16896] FAT-fs (loop5): invalid media value (0x00) [ 368.749632][T16896] FAT-fs (loop5): Can't find a valid FAT filesystem [ 368.783170][T16913] input: syz0 as /devices/virtual/input/input309 22:41:05 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x1163484000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000208d", 0xc) [ 368.947434][T16921] input: syz0 as /devices/virtual/input/input310 22:41:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x0, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:06 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x1200000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000408d", 0xc) 22:41:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x0, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000608d", 0xc) 22:41:06 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x1263484000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 369.560816][T16960] FAT-fs (loop5): invalid media value (0x00) [ 369.575039][T16960] FAT-fs (loop5): Can't find a valid FAT filesystem 22:41:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000ffffff978d", 0xc) 22:41:06 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x2000000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 369.841603][T16960] input: syz0 as /devices/virtual/input/input312 22:41:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:41:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000e08d", 0xc) 22:41:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_emit_ethernet(0x300dc1, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 370.109520][T16992] input: syz0 as /devices/virtual/input/input313 22:41:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:07 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x2300000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000003e88d", 0xc) 22:41:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:07 executing program 2: accept4(0xffffffffffffffff, 0x0, &(0x7f0000001180), 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) poll(&(0x7f00000002c0), 0x1, 0x4d) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xd1a, 0x0, 0x0, 0x800e003c6) r1 = dup(r0) shutdown(r1, 0x0) [ 370.746608][T17024] input: syz0 as /devices/virtual/input/input314 22:41:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000001f48d", 0xc) 22:41:07 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x3f00000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x0, 0xfcef}, 0x10) recvfrom$inet(r0, &(0x7f0000000100)=""/90, 0x83, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) setsockopt$inet_mreq(r0, 0x0, 0xd, &(0x7f0000000040), 0x8) recvfrom$inet(r1, 0x0, 0xd172, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) 22:41:08 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4000000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000fffffffe8d", 0xc) [ 371.158639][T17060] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 371.190049][T17047] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 371.237393][T17060] FAT-fs (loop1): Filesystem has been set read-only [ 371.277433][T17067] input: syz0 as /devices/virtual/input/input316 22:41:08 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4800000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 371.337989][T17047] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 371.408273][T17047] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:41:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000097ffffff8d", 0xc) 22:41:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 371.489597][T17047] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 371.547332][T17045] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 22:41:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000feffffff8d", 0xc) 22:41:08 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x4c00000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 371.902049][T17103] input: syz0 as /devices/virtual/input/input318 22:41:09 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6000000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000400008d", 0xc) [ 372.128918][T17110] input: syz0 as /devices/virtual/input/input319 22:41:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000700008d", 0xc) 22:41:09 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6800000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000a00008d", 0xc) 22:41:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:09 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x6c00000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000e00008d", 0xc) [ 372.826913][T17146] FAT-fs (loop3): bogus number of reserved sectors 22:41:09 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7400000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 372.909998][T17146] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000006000008d", 0xc) 22:41:10 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x7a00000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) [ 373.220840][T17163] input: syz0 as /devices/virtual/input/input321 [ 373.256805][T17171] input: syz0 as /devices/virtual/input/input322 22:41:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000e000008d", 0xc) 22:41:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:10 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0xff00000000000000, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 22:41:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000f401008d", 0xc) [ 373.696333][T17206] FAT-fs (loop3): bogus number of reserved sectors [ 373.718392][T17206] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:10 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x630b}], 0x0, 0x0, 0x0}) 22:41:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 373.892361][T17218] binder: 17217:17218 unknown command 0 22:41:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000e803008d", 0xc) [ 373.950826][T17218] binder: 17217:17218 ioctl c0306201 200001c0 returned -22 [ 374.046952][T17230] binder: 17217:17230 unknown command 0 [ 374.089007][T17230] binder: 17217:17230 ioctl c0306201 200001c0 returned -22 22:41:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000007008d", 0xc) 22:41:11 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x630c}], 0x0, 0x0, 0x0}) [ 374.336398][T17238] input: syz0 as /devices/virtual/input/input324 [ 374.366141][T17242] input: syz0 as /devices/virtual/input/input325 22:41:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000000a008d", 0xc) [ 374.546135][T17254] binder: 17253:17254 unknown command 0 [ 374.563023][T17254] binder: 17253:17254 ioctl c0306201 200001c0 returned -22 22:41:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000000e008d", 0xc) 22:41:11 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x630d}], 0x0, 0x0, 0x0}) [ 374.837921][T17265] FAT-fs (loop3): bogus number of reserved sectors [ 374.858595][T17269] binder: 17268:17269 unknown command 0 22:41:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000020008d", 0xc) [ 374.893350][T17269] binder: 17268:17269 ioctl c0306201 200001c0 returned -22 [ 374.937031][T17265] FAT-fs (loop3): Can't find a valid FAT filesystem [ 374.969853][T17279] binder: 17268:17279 unknown command 0 [ 375.014109][T17279] binder: 17268:17279 ioctl c0306201 200001c0 returned -22 22:41:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000040008d", 0xc) 22:41:12 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40046302}], 0x0, 0x0, 0x0}) [ 375.294268][T17298] binder: BC_ACQUIRE_RESULT not supported [ 375.319560][T17298] binder: 17297:17298 ioctl c0306201 200001c0 returned -22 22:41:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000060008d", 0xc) [ 375.416946][T17306] binder: BC_ACQUIRE_RESULT not supported [ 375.425949][T17292] input: syz0 as /devices/virtual/input/input327 [ 375.469194][T17306] binder: 17297:17306 ioctl c0306201 200001c0 returned -22 22:41:12 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40046304}], 0x0, 0x0, 0x0}) [ 375.618494][T17304] input: syz0 as /devices/virtual/input/input328 22:41:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000e0008d", 0xc) 22:41:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 375.791910][T17320] binder: 17319:17320 unknown command 35 [ 375.831405][T17320] binder: 17319:17320 ioctl c0306201 200001c0 returned -22 22:41:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 375.870409][T17325] binder: 17319:17325 unknown command 35 [ 375.881262][T17325] binder: 17319:17325 ioctl c0306201 200001c0 returned -22 22:41:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000003e8008d", 0xc) 22:41:12 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40046307}], 0x0, 0x0, 0x0}) [ 375.963298][T17328] FAT-fs (loop3): bogus number of reserved sectors 22:41:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 376.011294][T17328] FAT-fs (loop3): Can't find a valid FAT filesystem [ 376.106459][T17340] binder: 17338:17340 unknown command 35 22:41:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000001f4008d", 0xc) [ 376.155180][T17340] binder: 17338:17340 ioctl c0306201 200001c0 returned -22 [ 376.249826][T17345] binder: 17338:17345 unknown command 35 [ 376.289391][T17345] binder: 17338:17345 ioctl c0306201 200001c0 returned -22 22:41:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:13 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40086303}], 0x0, 0x0, 0x0}) 22:41:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000004008d", 0xc) [ 376.586459][T17348] input: syz0 as /devices/virtual/input/input330 [ 376.597395][T17361] binder: 17357:17361 unknown command 0 [ 376.613870][T17361] binder: 17357:17361 ioctl c0306201 200001c0 returned -22 22:41:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 376.688452][T17369] binder: 17357:17369 unknown command 0 [ 376.725011][T17369] binder: 17357:17369 ioctl c0306201 200001c0 returned -22 22:41:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000007008d", 0xc) 22:41:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:13 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x4008630a}], 0x0, 0x0, 0x0}) [ 376.858013][T17363] input: syz0 as /devices/virtual/input/input331 [ 377.012618][T17378] FAT-fs (loop3): bogus number of reserved sectors 22:41:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000000a008d", 0xc) [ 377.059634][T17389] binder: BC_ATTEMPT_ACQUIRE not supported [ 377.070099][T17378] FAT-fs (loop3): Can't find a valid FAT filesystem [ 377.079963][T17389] binder: 17388:17389 ioctl c0306201 200001c0 returned -22 [ 377.117263][T17390] binder: BC_ATTEMPT_ACQUIRE not supported 22:41:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 377.175391][T17390] binder: 17388:17390 ioctl c0306201 200001c0 returned -22 22:41:14 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40086310}], 0x0, 0x0, 0x0}) 22:41:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="0600000000000000000e008d", 0xc) [ 377.605005][T17414] binder: 17405:17414 unknown command 0 [ 377.610609][T17414] binder: 17405:17414 ioctl c0306201 200001c0 returned -22 [ 377.651047][T17413] input: syz0 as /devices/virtual/input/input333 [ 377.664619][T17417] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 377.690046][T17418] input: syz0 as /devices/virtual/input/input334 22:41:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000060008d", 0xc) [ 377.717434][T17423] binder: 17405:17423 unknown command 0 [ 377.745800][T17406] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 377.759649][T17423] binder: 17405:17423 ioctl c0306201 200001c0 returned -22 22:41:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 377.843763][T17417] FAT-fs (loop5): Filesystem has been set read-only [ 377.884819][T17406] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 22:41:14 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6302}], 0x0, 0x0, 0x0}) 22:41:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 377.982205][T17402] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 22:41:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000e0008d", 0xc) [ 378.044670][T17432] FAT-fs (loop3): bogus number of reserved sectors 22:41:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 378.111964][T17437] binder: 17434:17437 unknown command 1074553602 [ 378.128040][T17432] FAT-fs (loop3): Can't find a valid FAT filesystem [ 378.150221][T17437] binder: 17434:17437 ioctl c0306201 200001c0 returned -22 [ 378.206856][T17445] binder: 17434:17445 unknown command 1074553602 [ 378.213344][T17445] binder: 17434:17445 ioctl c0306201 200001c0 returned -22 22:41:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000f4018d", 0xc) 22:41:15 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6303}], 0x0, 0x0, 0x0}) 22:41:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 378.540568][T17462] binder: 17461:17462 unknown command 1074553603 22:41:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000e8038d", 0xc) [ 378.595062][T17462] binder: 17461:17462 ioctl c0306201 200001c0 returned -22 [ 378.657862][T17466] input: syz0 as /devices/virtual/input/input336 [ 378.674567][T17467] binder: 17461:17467 unknown command 1074553603 [ 378.732198][T17467] binder: 17461:17467 ioctl c0306201 200001c0 returned -22 22:41:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000078d", 0xc) [ 378.856046][T17471] input: syz0 as /devices/virtual/input/input337 22:41:15 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6304}], 0x0, 0x0, 0x0}) 22:41:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000a8d", 0xc) [ 379.049212][T17482] FAT-fs (loop3): bogus number of reserved sectors 22:41:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 379.119785][T17489] binder: 17487:17489 unknown command 1074553604 [ 379.143754][T17489] binder: 17487:17489 ioctl c0306201 200001c0 returned -22 [ 379.151140][T17482] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 379.200144][T17494] binder: 17487:17494 unknown command 1074553604 22:41:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000e8d", 0xc) [ 379.251635][T17494] binder: 17487:17494 ioctl c0306201 200001c0 returned -22 22:41:16 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6305}], 0x0, 0x0, 0x0}) 22:41:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000208d", 0xc) [ 379.521372][T17513] binder: 17510:17513 unknown command 1074553605 [ 379.564620][T17513] binder: 17510:17513 ioctl c0306201 200001c0 returned -22 [ 379.602478][T17501] input: syz0 as /devices/virtual/input/input339 22:41:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 379.678733][T17516] binder: 17510:17516 unknown command 1074553605 [ 379.704194][T17516] binder: 17510:17516 ioctl c0306201 200001c0 returned -22 22:41:16 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6306}], 0x0, 0x0, 0x0}) 22:41:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000408d", 0xc) [ 380.013198][T17532] binder: 17527:17532 unknown command 1074553606 [ 380.058237][T17532] binder: 17527:17532 ioctl c0306201 200001c0 returned -22 [ 380.096306][T17536] FAT-fs (loop3): bogus number of reserved sectors 22:41:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000608d", 0xc) [ 380.122696][T17536] FAT-fs (loop3): Can't find a valid FAT filesystem [ 380.132823][T17540] binder: 17527:17540 unknown command 1074553606 [ 380.162729][T17528] input: syz0 as /devices/virtual/input/input340 [ 380.199443][T17540] binder: 17527:17540 ioctl c0306201 200001c0 returned -22 22:41:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:17 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6307}], 0x0, 0x0, 0x0}) 22:41:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000e08d", 0xc) [ 380.479310][T17553] binder: 17552:17553 unknown command 1074553607 [ 380.510038][T17553] binder: 17552:17553 ioctl c0306201 200001c0 returned -22 [ 380.531811][T17560] binder: 17552:17560 unknown command 1074553607 [ 380.538974][T17560] binder: 17552:17560 ioctl c0306201 200001c0 returned -22 22:41:17 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6308}], 0x0, 0x0, 0x0}) 22:41:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000003e88d", 0xc) [ 380.792639][T17558] input: syz0 as /devices/virtual/input/input342 22:41:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 380.882771][T17572] binder: 17569:17572 unknown command 1074553608 22:41:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 380.950952][T17572] binder: 17569:17572 ioctl c0306201 200001c0 returned -22 22:41:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000001f48d", 0xc) [ 381.054172][T17582] binder: 17569:17582 unknown command 1074553608 [ 381.114426][T17582] binder: 17569:17582 ioctl c0306201 200001c0 returned -22 22:41:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 381.155527][T17587] FAT-fs (loop3): bogus number of reserved sectors 22:41:18 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6309}], 0x0, 0x0, 0x0}) [ 381.214166][T17587] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000048d", 0xc) [ 381.422151][T17600] binder: 17598:17600 unknown command 1074553609 [ 381.494751][T17600] binder: 17598:17600 ioctl c0306201 200001c0 returned -22 22:41:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000078d", 0xc) [ 381.579059][T17615] binder: 17598:17615 unknown command 1074553609 [ 381.637053][T17615] binder: 17598:17615 ioctl c0306201 200001c0 returned -22 22:41:18 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630a}], 0x0, 0x0, 0x0}) [ 381.744808][T17611] input: syz0 as /devices/virtual/input/input345 22:41:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 381.880852][T17626] binder: 17617:17626 unknown command 1074553610 22:41:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000a8d", 0xc) 22:41:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 381.923760][T17626] binder: 17617:17626 ioctl c0306201 200001c0 returned -22 [ 381.940808][T17627] binder: 17617:17627 unknown command 1074553610 [ 381.949504][T17627] binder: 17617:17627 ioctl c0306201 200001c0 returned -22 22:41:19 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630b}], 0x0, 0x0, 0x0}) [ 382.199721][T17645] binder: 17642:17645 unknown command 1074553611 22:41:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="060000000000000000000e8d", 0xc) [ 382.246075][T17645] binder: 17642:17645 ioctl c0306201 200001c0 returned -22 [ 382.273921][T17644] FAT-fs (loop3): bogus number of reserved sectors [ 382.288315][T17638] input: syz0 as /devices/virtual/input/input346 22:41:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 382.368547][T17644] FAT-fs (loop3): Can't find a valid FAT filesystem [ 382.390189][T17652] binder: 17642:17652 unknown command 1074553611 [ 382.452465][T17652] binder: 17642:17652 ioctl c0306201 200001c0 returned -22 22:41:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000608d", 0xc) 22:41:19 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630c}], 0x0, 0x0, 0x0}) [ 382.877874][T17670] binder: 17669:17670 unknown command 1074553612 [ 382.895675][T17670] binder: 17669:17670 ioctl c0306201 200001c0 returned -22 22:41:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000e08d", 0xc) [ 382.933949][T17664] input: syz0 as /devices/virtual/input/input348 [ 382.968649][T17674] binder: 17669:17674 unknown command 1074553612 22:41:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 382.997403][T17674] binder: 17669:17674 ioctl c0306201 200001c0 returned -22 22:41:20 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630d}], 0x0, 0x0, 0x0}) 22:41:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0x3) [ 383.307196][T17700] FAT-fs (loop3): bogus number of reserved sectors [ 383.326964][T17703] binder: 17691:17703 unknown command 1074553613 [ 383.335080][T17700] FAT-fs (loop3): Can't find a valid FAT filesystem [ 383.341823][T17703] binder: 17691:17703 ioctl c0306201 200001c0 returned -22 22:41:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xb) [ 383.372993][T17689] input: syz0 as /devices/virtual/input/input349 [ 383.410252][T17707] binder: 17691:17707 unknown command 1074553613 [ 383.458771][T17707] binder: 17691:17707 ioctl c0306201 200001c0 returned -22 22:41:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:20 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) 22:41:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xfdef) [ 383.899737][T17727] binder: 17723:17727 unknown command 0 22:41:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xffeb) [ 383.940869][T17727] binder: 17723:17727 ioctl c0306201 200001c0 returned -22 [ 384.005245][T17733] binder: 17723:17733 unknown command 0 [ 384.025908][T17729] input: syz0 as /devices/virtual/input/input351 [ 384.053714][T17733] binder: 17723:17733 ioctl c0306201 200001c0 returned -22 22:41:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:21 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6310}], 0x0, 0x0, 0x0}) 22:41:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0x2000004c) [ 384.355144][T17750] binder: 17748:17750 unknown command 1074553616 [ 384.370965][T17752] FAT-fs (loop3): bogus number of reserved sectors 22:41:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xfffffdef) [ 384.400939][T17750] binder: 17748:17750 ioctl c0306201 200001c0 returned -22 [ 384.427237][T17752] FAT-fs (loop3): Can't find a valid FAT filesystem [ 384.484467][T17763] binder: 17748:17763 unknown command 1074553616 [ 384.491963][T17743] input: syz0 as /devices/virtual/input/input352 [ 384.534528][T17763] binder: 17748:17763 ioctl c0306201 200001c0 returned -22 22:41:21 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6311}], 0x0, 0x0, 0x0}) 22:41:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xfffffffffffffdef) [ 384.925272][T17785] binder: 17782:17785 unknown command 1074553617 [ 384.931765][T17785] binder: 17782:17785 ioctl c0306201 200001c0 returned -22 22:41:22 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x541000, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000005c0)={0xa00000, 0x22ea, 0x1, [], &(0x7f0000000580)={0x990afe, 0x3, [], @ptr}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x2, 0x3, 0x84) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@v2={0x7, 0x0, 0x13, 0x8, 0x78, "7457ccdf65fbf84f08eed282e2657a9ab97ecc4c1f04845fce64cf3c11a8c12707f080013d60874ab36ca296417005d0d9231e50163f8d6a9a73626970705c808801f08ce70843180c41b5f0c1359a063c3b6703876a6df5a4a98e79d42a09ca28b34712b0ac82ce7628fa1a97dafe09018067526dd5988a"}, 0x82, 0x1) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f00000000c0)={0x7fffffff, 0x8, 0x0, [{0x5, 0x800, 0x3, 0xfff, 0x5, 0x7, 0x1}, {0x7, 0x1, 0x8001, 0x3, 0xfffffffffffffa9d, 0xffffffff00000001, 0x1}, {0x8, 0x800, 0x6c4, 0x8c67, 0x3, 0x6, 0x40}, {0x10000, 0x3, 0x3, 0x7, 0x846, 0x81, 0x1000}, {0x8, 0x101, 0xfffffffffffffff9, 0x8000, 0x6, 0x6, 0x4}, {0x101, 0x1, 0x9, 0x4, 0xd1, 0x9, 0x1f}, {0x7, 0x8, 0x4, 0x7, 0x8, 0x80, 0x3}, {0x5, 0xff, 0xffffffffffff1b9d, 0xb1e2, 0x7, 0x1, 0x7f}]}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0xda4, 0x400080) write(r3, &(0x7f0000000340)="0000000700f285b6178007007d607dd2f7abcbc3cfbe15bfebbbf4bd0aea2fdb06cabe9ba6e4764412fbbfe500aae33bcf6e21b1ab1c0944644d2f71026b4599805def734de4bfdf786c18f13e46c71231804fb77b9ff215422f76d28836d313d1eb15f4f42d999660f8e25a3124c579b489e19b182cb4c5bcd02ea999ac9f1a6f8e208eb4ad62bc79c6f4c55247ff9266f4120fc357cc3931b0fa8eb86a22d74ab20fee36d26f998297cf0ea24f9ed3859ba53fe9a89b7c6dbc105b56ac53ea3d9704981d1a632e1bcabcb9cf99b9a7842f646d44be543a73945ee743dd6c96faa9d28aff75ef6ab340", 0xfffffffffffffd88) [ 385.063391][T17794] binder: 17782:17794 unknown command 1074553617 [ 385.100055][T17794] binder: 17782:17794 ioctl c0306201 200001c0 returned -22 22:41:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 385.175024][T17786] input: syz0 as /devices/virtual/input/input354 22:41:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:22 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6312}], 0x0, 0x0, 0x0}) [ 385.499976][T17813] FAT-fs (loop3): bogus number of reserved sectors [ 385.508172][T17816] input: syz0 as /devices/virtual/input/input355 [ 385.528156][T17813] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:22 executing program 2: getdents(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0xc000000, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x700000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @local}}}, 0x48) 22:41:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x10000076}, 0xffffffffffffffc5) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x14000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r3, 0xfffffffeffffffff}, &(0x7f0000000340)=0x8) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x4, 0x2) write(r1, &(0x7f00000000c0)="06010400000000000000008d68809ed9bd9c9bfa2719d22a371fe4c1dd620c627ddd589d4e8bd75616bb3502b4cac3159ac6b42e648f7754825c26a0bd90f16305bacdc8b9eea1398567764e223d27d5c958c929794d43da7e401aa034d49bfe55db1fe67b0bca184659143b332b3e9dc1d947dbc54d023b1cbcbb7fd041ebb37f7afe474f659f87085ee8f5dbb5e632f8ac5fe01d853abbc17a77874e4ceec05fdfbe86c6d7d074701450d61bf252a4b488a0bcde51dcac4ea16bcabe90b718cf4e7b34629e93e056838fa4a2f6f051e856fa2a8b83cecd8584fa0d8300"/231, 0x55) 22:41:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 385.597849][T17817] binder: 17815:17817 unknown command 1074553618 [ 385.639741][T17817] binder: 17815:17817 ioctl c0306201 200001c0 returned -22 [ 385.689474][T17830] binder: 17815:17830 unknown command 1074553618 22:41:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='me\x7fory.s\x00', 0x0, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f00000000c0)=0x9) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) epoll_create1(0x80000) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000100)) [ 385.751125][T17830] binder: 17815:17830 ioctl c0306201 200001c0 returned -22 22:41:22 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x1, 0x0) write$nbd(r0, &(0x7f0000000200)={0x6000000, 0x0, 0x0, 0x0, 0x5, "a3ef41749fa527ab78fc57f180bd82099cbab35a2fdbede5fbb11bedfb1f8cd557b0bdfcd7f42f63af872a0a11e32f7a06bebb02f6b78b1ea525f6ba185947306a84eb578d5d1004425fc78b343624c6c5e7be78ab9406a3"}, 0x68) 22:41:22 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c633d}], 0x0, 0x0, 0x0}) [ 385.906584][T17831] input: syz0 as /devices/virtual/input/input357 22:41:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x1ff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x58, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e21, 0x800, @rand_addr="28efe0a6d2dfd9dc2523afb5ec84a4c2", 0x7}, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x15}, 0x4}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e21, 0x401, @remote, 0x4}}, [0x5, 0x8000, 0x12000, 0x9, 0x5f6f8963, 0x2, 0x100, 0x6, 0x1e00, 0x1f, 0x9, 0x81, 0x0, 0x1, 0x9]}, &(0x7f00000002c0)=0x100) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dc86055e0bceec7be070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x3, 0x6, @dev}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r1) [ 386.154736][T17850] binder: 17849:17850 unknown command 1074553661 [ 386.176986][T17850] binder: 17849:17850 ioctl c0306201 200001c0 returned -22 22:41:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$KDENABIO(r2, 0x4b36) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 386.223498][T17854] binder: 17849:17854 unknown command 1074553661 [ 386.248384][T17854] binder: 17849:17854 ioctl c0306201 200001c0 returned -22 [ 386.295601][T17859] device team_slave_0 entered promiscuous mode 22:41:23 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c6350}], 0x0, 0x0, 0x0}) 22:41:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000080)={{0x8, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x3, 'wlc\x00', 0x0, 0x8, 0x44}, {@rand_addr=0xa39, 0x4e20, 0x10003, 0x6, 0x80000000, 0x100000000}}, 0x44) [ 386.362400][T17857] device team_slave_0 left promiscuous mode [ 386.452751][T17857] device team_slave_0 entered promiscuous mode [ 386.508940][T17869] input: syz0 as /devices/virtual/input/input358 [ 386.530445][T17872] FAT-fs (loop3): bogus number of reserved sectors [ 386.531885][T17883] binder: 17877:17883 unknown command 1074553680 [ 386.572490][T17857] device team_slave_0 left promiscuous mode [ 386.573090][T17885] IPVS: set_ctl: invalid protocol: 8 172.30.1.5:20002 [ 386.587136][T17883] binder: 17877:17883 ioctl c0306201 200001c0 returned -22 22:41:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 386.636504][T17872] FAT-fs (loop3): Can't find a valid FAT filesystem [ 386.659162][T17883] binder: 17877:17883 unknown command 1074553680 [ 386.678319][T17883] binder: 17877:17883 ioctl c0306201 200001c0 returned -22 22:41:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dc86055e0bceec7be070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x3, 0x6, @dev}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r1) 22:41:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x200) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000000c0)) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:23 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c635d}], 0x0, 0x0, 0x0}) [ 386.914110][T17904] device team_slave_0 entered promiscuous mode [ 386.961788][T17906] binder: 17903:17906 unknown command 1074553693 [ 387.001008][T17906] binder: 17903:17906 ioctl c0306201 200001c0 returned -22 22:41:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000080)) [ 387.013679][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 387.019487][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 387.022914][T17897] device team_slave_0 left promiscuous mode [ 387.095863][T17915] binder: 17903:17915 unknown command 1074553693 [ 387.123511][T17915] binder: 17903:17915 ioctl c0306201 200001c0 returned -22 22:41:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dc86055e0bceec7be070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x3, 0x6, @dev}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r1) 22:41:24 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40106308}], 0x0, 0x0, 0x0}) 22:41:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 387.195787][T17907] input: syz0 as /devices/virtual/input/input360 22:41:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x9, 0x8, 0x6, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x8, 0x20}) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 387.322362][T17926] device team_slave_0 entered promiscuous mode [ 387.382951][T17922] device team_slave_0 left promiscuous mode [ 387.402524][T17929] binder: 17927:17929 unknown command 0 [ 387.421685][T17929] binder: 17927:17929 ioctl c0306201 200001c0 returned -22 22:41:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="39000000140081ae0000dc676f97daf01e23578134662c300b2c000500018701546fabca1b4e7d06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) [ 387.487237][T17943] binder: 17927:17943 unknown command 0 [ 387.527967][T17937] FAT-fs (loop3): bogus number of reserved sectors 22:41:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004280)=[{{&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/193, 0xc1}], 0x1, &(0x7f00000003c0)=""/112, 0x70}, 0x6}, {{&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/88, 0x58}], 0x1, &(0x7f0000000580)=""/19, 0x13}, 0x6}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/201, 0xc9}], 0x1}, 0x6}, {{&(0x7f0000000700)=@x25={0x9, @remote}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/160, 0xa0}, {&(0x7f0000001840)=""/68, 0x44}], 0x3, &(0x7f0000001900)=""/114, 0x72}, 0xa8}, {{0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000001980)=""/4096, 0x1000}], 0x1, &(0x7f00000029c0)=""/85, 0x55}}, {{&(0x7f0000002a40)=@l2, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002ac0)=""/97, 0x61}, {&(0x7f0000002b40)=""/249, 0xf9}, {&(0x7f0000002c40)=""/162, 0xa2}, {0xfffffffffffffffe}, {&(0x7f0000002d00)=""/243, 0xf3}], 0x5, &(0x7f0000002e80)=""/69, 0x45}, 0xffff}, {{&(0x7f0000002f00)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000004140)=[{&(0x7f0000002f80)=""/131, 0x83}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/106, 0x6a}, {&(0x7f00000040c0)=""/116, 0x74}], 0x4, &(0x7f0000004180)=""/227, 0xe3}}], 0x7, 0x10000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000004480)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000004580)={&(0x7f0000004440)={0x10, 0x0, 0x0, 0x20011800}, 0xc, &(0x7f0000004540)={&(0x7f0000004600)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000025bd7000ffdbdf25010000000000000009410000004c001800000004696200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a511829d33a6ea00"/105], 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/full\x00', 0x400, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r4 = socket$inet(0x2, 0x3, 0x84) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x626100, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x3e, &(0x7f0000000180)=0x80, 0x4) getsockopt$sock_buf(r4, 0x1, 0x3d, &(0x7f00000044c0)=""/72, &(0x7f0000004680)=0x48) syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r4, &(0x7f0000000200)="06000000000000000000008d", 0xc) [ 387.572329][T17943] binder: 17927:17943 ioctl c0306201 200001c0 returned -22 [ 387.574245][T17937] FAT-fs (loop3): Can't find a valid FAT filesystem [ 387.612685][T17940] input: syz0 as /devices/virtual/input/input361 22:41:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:24 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40106309}], 0x0, 0x0, 0x0}) 22:41:24 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x100000c1004110, &(0x7f0000000440)="bca572f7593af6ddddaf40e5da") 22:41:24 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x10004000000002, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$FIGETBSZ(r1, 0x2, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x548, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0xfffffffffffffe22, 0x0}}], 0x1ece87a4671555d, 0x42, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 387.931419][T17966] binder: 17965:17966 unknown command 0 [ 387.953435][T17966] binder: 17965:17966 ioctl c0306201 200001c0 returned -22 [ 387.970936][T17968] binder: 17965:17968 unknown command 0 [ 387.977871][T17968] binder: 17965:17968 ioctl c0306201 200001c0 returned -22 22:41:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40406300}], 0x0, 0x0, 0x0}) [ 388.143932][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 388.143947][ T26] audit: type=1400 audit(1562020885.123:80): avc: denied { map } for pid=17971 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=57164 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 388.253111][T17977] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 388.282232][T17980] input: syz0 as /devices/virtual/input/input363 22:41:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40406301}], 0x0, 0x0, 0x0}) 22:41:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 388.316782][T17977] FAT-fs (loop5): Filesystem has been set read-only [ 388.361242][T17969] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 388.430375][T17990] FAT-fs (loop3): bogus number of reserved sectors [ 388.446587][T17969] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 388.468825][T17990] FAT-fs (loop3): Can't find a valid FAT filesystem [ 388.530551][T17996] FAT-fs (loop1): bogus number of reserved sectors 22:41:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40486311}], 0x0, 0x0, 0x0}) 22:41:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @multicast1}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) r2 = socket$inet(0x2, 0x3, 0x84) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000000c0)) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r2, &(0x7f0000000040)="06000000000000000000008d", 0xc) [ 388.578270][T17996] FAT-fs (loop1): Can't find a valid FAT filesystem [ 388.728861][T17996] input: syz0 as /devices/virtual/input/input365 [ 388.784499][T17967] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 22:41:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x40486312}], 0x0, 0x0, 0x0}) 22:41:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") syz_emit_ethernet(0x296449, &(0x7f0000000500)={@local, @broadcast, [], {@arp={0x8100, @ether_ipv4={0x1, 0x8847, 0x6, 0x4, 0x0, @link_local={0x2}, @broadcast, @link_local}}}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x84) pread64(r2, &(0x7f0000000080)=""/4096, 0x1000, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) write(r2, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:26 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x2}], 0x0, 0x0, 0x0}) 22:41:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000300)={0x3, @default, r2}) r3 = socket$inet(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r3, &(0x7f0000000040)="06000000000000000000008d", 0xc) r4 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/56) ioctl$SIOCAX25ADDUID(r4, 0x89e1, &(0x7f0000000180)={0x3, @null, r5}) [ 389.418564][T18045] binder: 18040:18045 unknown command 0 [ 389.452554][T18045] binder: 18040:18045 ioctl c0306201 200001c0 returned -22 [ 389.490842][T18045] binder: 18040:18045 unknown command 0 [ 389.499215][T18036] input: syz0 as /devices/virtual/input/input366 [ 389.520039][T18045] binder: 18040:18045 ioctl c0306201 200001c0 returned -22 22:41:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x3ad) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={r1}, 0x8) 22:41:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1, 0x6000) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0xb00) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x44}) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f00000000c0)={0xfff, 0x101, 0x5, 0x8, 0x50ae, 0xca6}) 22:41:26 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x3}], 0x0, 0x0, 0x0}) 22:41:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$netlink(r2, 0x10e, 0x7, &(0x7f0000000280)=""/169, &(0x7f0000000340)=0xa9) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f00000000c0)={0x29, 0x4, 0x0, {0x2, 0x2, 0x1, 0x0, [0x0]}}, 0x29) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) [ 389.719888][T18054] binder: 18052:18054 unknown command 0 [ 389.741293][T18054] binder: 18052:18054 ioctl c0306201 200001c0 returned -22 [ 389.779700][T18057] FAT-fs (loop3): bogus number of reserved sectors [ 389.807392][T18068] binder: 18052:18068 unknown command 0 22:41:26 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 389.840762][T18061] FAT-fs (loop1): bogus number of reserved sectors [ 389.868598][T18068] binder: 18052:18068 ioctl c0306201 200001c0 returned -22 [ 389.882988][T18061] FAT-fs (loop1): Can't find a valid FAT filesystem [ 389.886358][T18057] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:26 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x4}], 0x0, 0x0, 0x0}) [ 390.009423][T18077] input: syz0 as /devices/virtual/input/input368 22:41:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, 0x0) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 390.105421][T18082] binder: 18081:18082 unknown command 0 [ 390.134159][T18082] binder: 18081:18082 ioctl c0306201 200001c0 returned -22 22:41:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet_sctp(r1, 0x0, 0x0, 0x20000004) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000000c0)) [ 390.176542][T18090] binder: 18081:18090 unknown command 0 [ 390.232958][T18090] binder: 18081:18090 ioctl c0306201 200001c0 returned -22 22:41:27 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x5}], 0x0, 0x0, 0x0}) 22:41:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) socket$inet6(0xa, 0x4, 0x80000001) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) [ 390.505248][T18098] input: syz0 as /devices/virtual/input/input369 22:41:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 390.568263][T18104] binder: 18103:18104 unknown command 0 [ 390.599007][T18104] binder: 18103:18104 ioctl c0306201 200001c0 returned -22 22:41:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40100, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r2 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x2, 0x9, 0x800b, 0xcd46, 0x51, 0x7, 0x3, 0x60b, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={r4, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}}, 0x84) write(r2, &(0x7f0000000080)="06000000000000000000008d", 0x1d) [ 390.701694][T18116] binder: 18103:18116 unknown command 0 [ 390.732935][T18116] binder: 18103:18116 ioctl c0306201 200001c0 returned -22 [ 390.756179][T18118] FAT-fs (loop3): bogus number of reserved sectors [ 390.780019][T18121] FAT-fs (loop1): bogus number of reserved sectors [ 390.803306][T18118] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:27 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x6}], 0x0, 0x0, 0x0}) [ 390.837325][T18121] FAT-fs (loop1): Can't find a valid FAT filesystem 22:41:27 executing program 2: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000cc0)=[{&(0x7f0000000600)=""/204, 0xcc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) ppoll(&(0x7f0000000000), 0x2, 0x0, 0x0, 0xfffffcdd) shutdown(r1, 0x0) 22:41:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x80, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0x2, 0x1f, 0x2, 0x7, 0xb, 0x80, 0x2, 0x3f, 0x5, 0xff, 0x5, 0x3}) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) close(r0) r2 = socket$inet(0x2, 0x3, 0x84) setsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080)=0xd8f, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r2, &(0x7f0000000040)="06000000000000000000008d", 0xff1b) ioctl$TIOCSCTTY(r1, 0x540e, 0x1) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000180)) [ 390.951400][T18132] input: syz0 as /devices/virtual/input/input371 [ 391.049986][T18139] binder: 18137:18139 unknown command 0 [ 391.100042][T18139] binder: 18137:18139 ioctl c0306201 200001c0 returned -22 22:41:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, 0x0) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 391.162136][T18148] binder: 18137:18148 unknown command 0 [ 391.230522][T18148] binder: 18137:18148 ioctl c0306201 200001c0 returned -22 22:41:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f00000000c0)=""/157) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:28 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x7}], 0x0, 0x0, 0x0}) [ 391.507241][T18162] binder: 18159:18162 unknown command 0 [ 391.523697][T18162] binder: 18159:18162 ioctl c0306201 200001c0 returned -22 22:41:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = dup2(r1, r1) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x20}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r3, @in={{0x2, 0x4e21, @broadcast}}, 0x7, 0x2}, &(0x7f00000001c0)=0x90) write(r1, &(0x7f0000000200)="06000000000000000000008d", 0xc) fanotify_init(0x10, 0x80000) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) [ 391.620062][T18165] binder: 18159:18165 unknown command 0 [ 391.626121][T18158] input: syz0 as /devices/virtual/input/input372 [ 391.649942][T18165] binder: 18159:18165 ioctl c0306201 200001c0 returned -22 22:41:28 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x8}], 0x0, 0x0, 0x0}) [ 391.744397][T18172] FAT-fs (loop3): invalid media value (0x00) [ 391.773830][T18176] FAT-fs (loop1): bogus number of reserved sectors [ 391.794334][T18176] FAT-fs (loop1): Can't find a valid FAT filesystem [ 391.801735][T18172] FAT-fs (loop3): Can't find a valid FAT filesystem 22:41:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) prctl$PR_SET_FP_MODE(0x2d, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:28 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x100000006}]}) ioctl$PPPIOCSACTIVE(r0, 0x40087446, &(0x7f0000000180)={0x0, 0x0}) [ 391.940255][T18189] binder: 18188:18189 unknown command 0 [ 391.972451][T18189] binder: 18188:18189 ioctl c0306201 200001c0 returned -22 [ 391.989612][T18185] input: syz0 as /devices/virtual/input/input374 [ 392.040710][T18195] binder: BINDER_SET_CONTEXT_MGR already set [ 392.067967][T18195] binder: 18188:18195 ioctl 40046207 0 returned -16 [ 392.101504][T18202] binder: 18188:18202 unknown command 0 22:41:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x100000003, 0x1000) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@empty, @in=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) write(r1, &(0x7f0000000240)="0600ffdf0000008d306e69e77ef1857952a3672ca4cc752e24cdd83b4c0888f7541f685c53e815636cdcf0f60d9e371fc35d7e70854a0fa7668d5ec652b6f29b9a581f7f406fb67c64440cd3bd0b9d2bf64fe577e1955d10bf12b8fc5a7e860aca4dacf12f384a8414cd1f512a265e494e6055b118", 0xfe21) [ 392.140890][ T26] audit: type=1326 audit(1562020889.123:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18199 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c35a code=0x0 [ 392.167797][T18202] binder: 18188:18202 ioctl c0306201 200001c0 returned -22 22:41:29 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0xa}], 0x0, 0x0, 0x0}) 22:41:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, 0x0) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) ioctl$RTC_VL_CLR(r0, 0x7014) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) [ 392.389042][T18209] binder: 18208:18209 unknown command 0 [ 392.413131][T18209] binder: 18208:18209 ioctl c0306201 200001c0 returned -22 22:41:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 392.518259][T18216] binder: 18208:18216 unknown command 0 [ 392.536094][T18216] binder: 18208:18216 ioctl c0306201 200001c0 returned -22 22:41:29 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x12}], 0x0, 0x0, 0x0}) 22:41:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x0, 0x5) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x20000, 0x0) write$P9_RSTAT(r2, &(0x7f00000000c0)={0x54, 0x7d, 0x1, {0x0, 0x4d, 0x4, 0x401, {0x3, 0x4, 0x2}, 0x80000000, 0x2, 0x5, 0x6, 0x5, '/proc', 0x1, '(', 0x1, '*', 0x13, 'GPLposix_acl_access'}}, 0x54) [ 392.685411][T18221] input: syz0 as /devices/virtual/input/input375 [ 392.750295][T18225] FAT-fs (loop1): bogus number of reserved sectors [ 392.754583][T18230] binder: 18227:18230 unknown command 0 [ 392.772684][T18229] FAT-fs (loop3): invalid media value (0x00) [ 392.793837][T18225] FAT-fs (loop1): Can't find a valid FAT filesystem [ 392.817917][T18230] binder: 18227:18230 ioctl c0306201 200001c0 returned -22 [ 392.840862][T18229] FAT-fs (loop3): Can't find a valid FAT filesystem [ 392.862941][T18243] binder: 18227:18243 unknown command 0 [ 392.896440][ T26] audit: type=1326 audit(1562020889.883:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18199 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c35a code=0x0 [ 392.932008][T18243] binder: 18227:18243 ioctl c0306201 200001c0 returned -22 22:41:30 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x23}], 0x0, 0x0, 0x0}) 22:41:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000000000002abf34bec7"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ca], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 393.032419][T18233] input: syz0 as /devices/virtual/input/input376 22:41:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 22:41:30 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a2, 0x0) r1 = memfd_create(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[], 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x0, 0x0, 0x7, 0x1f, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x20, 0x20, 0xf29}, 0x20}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0xcc, 0x581000) 22:41:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x40000, 0x0) accept4$x25(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x12, 0x80000) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000140)={0x0, "0a7e0fc210d6108ac409dc09dea56aaa4a943ca422086413f7735cc5b684d326", 0x0, 0x100, 0x819, 0x3ff, 0x8, 0x3, 0x8, 0x7fffffff}) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) [ 393.261855][T18265] binder: 18263:18265 unknown command 0 [ 393.288190][T18265] binder: 18263:18265 ioctl c0306201 200001c0 returned -22 22:41:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00'}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 393.393196][T18273] binder: 18263:18273 unknown command 0 [ 393.394980][T18268] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 393.399407][T18273] binder: 18263:18273 ioctl c0306201 200001c0 returned -22 22:41:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1, 0x5e) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r3, 0x401, 0xff, 0x7}, &(0x7f0000000140)=0x10) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:30 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x48}], 0x0, 0x0, 0x0}) 22:41:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 393.727790][T18293] binder: 18289:18293 unknown command 0 [ 393.764237][T18293] binder: 18289:18293 ioctl c0306201 200001c0 returned -22 22:41:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x8080, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x44) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x1, 0x0, 0x10001, 0x8c}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000140)={r2, 0x8}) write(r1, &(0x7f0000000280)="06dafecab24401c9b07380484be2000000000000000000008d", 0x19) write$P9_RCREATE(r1, &(0x7f0000000240)={0x18, 0x73, 0x2, {{0x20, 0x1}, 0x7}}, 0x18) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) [ 393.777194][T18283] input: syz0 as /devices/virtual/input/input378 [ 393.815080][T18293] binder: 18289:18293 unknown command 0 [ 393.820667][T18293] binder: 18289:18293 ioctl c0306201 200001c0 returned -22 [ 393.847520][T18295] FAT-fs (loop1): bogus number of reserved sectors [ 393.864660][T18268] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 393.906949][T18307] FAT-fs (loop3): invalid media value (0x00) [ 393.944946][T18295] FAT-fs (loop1): Can't find a valid FAT filesystem [ 393.961519][T18307] FAT-fs (loop3): Can't find a valid FAT filesystem [ 393.978516][T18302] input: syz0 as /devices/virtual/input/input379 22:41:31 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x100000000, 0x80400) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x84) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000002c0)={0x16, 0x17, 0x0, 0x15, 0x1, 0x101, 0x6, 0xc1}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x322, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20004081) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvfrom$rose(r0, &(0x7f00000000c0)=""/54, 0x36, 0x2040, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) write(r2, &(0x7f0000000040)="06000000000000000000008d", 0xc) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x8) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000140)={0x1, 0x0, [{}]}) 22:41:31 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x4c}], 0x0, 0x0, 0x0}) 22:41:31 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x5a60c7b5}, 0x73) sendmmsg(r1, &(0x7f0000003d40), 0x4000000000002be, 0x0) close(r1) close(r0) 22:41:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:31 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x2000, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)={{0x108, 0x46f, 0x10000, 0x2fb, 0x14a, 0x4, 0x1e7, 0x5}, "7a28e2ba44ef24d33e05c51ba4921c5cdcc85110e0a3012b825e9ec12f1ef7531381d9b3114561310a2ee18fb4b96892dd120223ea074163e4599b355dc575770aca71b019bf96cf3ac5b53226b608872498f044304b1b47801f27b9d497f0620abbf4b479f0e7d119a0980341da81b0e0d02fe5b6c1efbb5fcbbff7c14c46c36cd57613ce16577ae9e4541bdc3d10464c4360580dbe13cdb351cd70681c2a66b6a2f9c212e7b86788", [[], [], [], [], [], [], [], [], []]}, 0x9c9) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) close(r0) r2 = socket$inet(0x2, 0x3, 0x84) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r2, &(0x7f0000000040)="06000000000000000000008d", 0xc) 22:41:31 executing program 2: socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) poll(&(0x7f00000002c0), 0x1, 0x4d) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xd1a, 0x0, 0x0, 0x800e003c6) r1 = dup(r0) recvmsg(r1, &(0x7f00000011c0)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) shutdown(r1, 0x0) [ 394.230359][T18329] binder: 18326:18329 unknown command 0 [ 394.253822][T18329] binder: 18326:18329 ioctl c0306201 200001c0 returned -22 [ 394.316998][T18330] binder: 18326:18330 unknown command 0 22:41:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00'}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000007000800db74000000ee8b08b79663b8f241fde1e0797b856900bc2189026ccb3036b564df5ef89efd50fe203534da91b5b9fb501e1a0000a3841f9d63e232b9b2500fb1d96033ccfdff060fb7eb4c319a6d03fde6fce80abf7d1aa65d6b0643347c3a8b99c6fa6a3c850f6ddda296464b0ff597d3eca9392d82389f82bf1dfb9179297146ebb2e850844f93e2ee11d8ba31d649485969f51d5f31d73b406ae204ada5478289b2ed77caffa32cd3617dd7ce9f45d18a2ad96f41d15c4564cecec97f24e750a6ec0652d48e563ef547b23da34ac3a4bfffaca89ee55ef32abed957347f48b505411e65f83e676d7551e9876bb341d24a86d78d0121366af86deed85c229bbc0cf337f19a69f462d15524014c6d9a121a98b73451ea56d692ba8c707ded0e257938f3bc377cb7eba1d34eb82f3f98a9d9eebe225a037d9bdb85a255a38638bc7c088eaed64086c6bceaa69615826920bb59711ebe7f16558ce5a1cdf2bd00f89691bfb15e546b33ca58948f5f5f0c160acb3146c4b1213b05000000ade34dd7bab140d7ad3017a356135008e0db7354216ac3598f93d1c1bfeea183f0dfda2c5a66"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 394.395289][T18330] binder: 18326:18330 ioctl c0306201 200001c0 returned -22 22:41:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x290002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x4}}, 0x20) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x82000002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r3, 0x0, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040}, 0x24040005) 22:41:31 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x60}], 0x0, 0x0, 0x0}) [ 394.481659][T18340] FAT-fs (loop1): bogus number of reserved sectors [ 394.489966][T18340] FAT-fs (loop1): Can't find a valid FAT filesystem [ 394.597879][T18351] binder: 18348:18351 unknown command 0 22:41:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) recvmsg$kcm(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1, &(0x7f0000000580)=""/131, 0x83}, 0x0) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x1) r5 = getpid() perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x9ade, 0x4f, 0x80000000, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3, 0x0, 0xfd, 0x0, 0x8, 0x2a5d, 0x0, 0x8, 0x0, 0x8190, 0x5, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x5}, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r5, 0x2, r2, 0x3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/19, 0x13}], 0x1, &(0x7f00000004c0)=""/143, 0x8f}, 0x0) r6 = openat$cgroup_ro(r3, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socket$kcm(0x29, 0x5, 0x0) [ 394.671170][T18340] input: syz0 as /devices/virtual/input/input381 [ 394.700447][T18351] binder: 18348:18351 ioctl c0306201 200001c0 returned -22 22:41:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) r2 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000001c0)=0x2cf4491f) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f00000000c0)={{0x1, 0x2}, 'port0\x00', 0x9, 0x40c40, 0xf3f, 0x8, 0xfff, 0x3ff, 0x1fe000, 0x0, 0x4, 0x1}) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) flistxattr(r1, &(0x7f0000000200)=""/60, 0x3c) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) socket$l2tp(0x18, 0x1, 0x1) [ 394.791980][T18367] binder: 18348:18367 unknown command 0 [ 394.810553][T18367] binder: 18348:18367 ioctl c0306201 200001c0 returned -22 22:41:31 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x68}], 0x0, 0x0, 0x0}) 22:41:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) time(&(0x7f0000000080)) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400000) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r3}}, 0x18) write(r1, &(0x7f0000000040)="06000000000000000000008d", 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'bcsf0\x00', 0x0}) sendmsg$xdp(r2, &(0x7f0000000640)={&(0x7f00000002c0)={0x2c, 0x0, r4, 0x1e}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000300)="dad5c013023ec6e06f6d1046b67887c46c6dfc87b96c31b06f3126932cfadc39d65d02a9bd7d782fe1786346cee0c6c3ddadb5853a709da09cbda4e7a63b11537f37f649d40f51b85b0a71216026da21e22e9001fc1a86400e2f04b3748e7d7acc20b36805ef4120cb55058e790ad285b9e6cc1c3b4738fd00a8471604ff3a811303e23df587500b303c7b57d602d2078a2c462f676103dfb3b4e505cddfd19b2caba85a9222d73c87fa6e0e7f10b8db93b956417ea2509519b3ec059475fc80df8d652031171398b2808f59b179b2ac5eed8ddbbebe30e2372a47b9b1b1d73d921063fcc523e077f501e1d5d69e94", 0xef}, {&(0x7f0000000400)="a5625e71c23bf4ea177ee3ccc97567551a6f441aaa9f1fc031a2ac367241c1c534fd341e0b87c03d691aed11dd35fad30efae5d6aba3cd3bd653ace031955d56ba30b7357a23b59974c8831c67f8058c5f8c3e5467e1dd6ea6e4ff6e332ccfa31561d1afb9a3240ea48dcc5c41383dc5e5d2b04eebf6378365ab7c2d8c276c307cffd605ef2acf59bb53772ae55d5037dfd9d58248bf4422d90c1d8e0ec15e9d422154e82d28559b941b0d5ff3bb67410e19358848780fcf3912798cb73ed4a4c9c681115428003bf2c800349abaf1ed05e219b0e3", 0xd5}, {&(0x7f0000000500)="7128d34013ec94072b718758f33537cc464be074a386e5ce41212b4da4745f20ccc0d5aae4bfd405e91e4b5f37cffe496543ebd1c550293d5f6ccf16f38d9425a107e22cdeea69254460243462b435a391113d31db886f08ef6a1f81af217fc456a64c1f0ac46826bee3ae03262cf5b6dc6fd99ee18f3c5d1e078a047189cc66f3687b9c9fc2ce458bd3f0fec16c1c8a3ea9ce905d0d0290b7189f9890291134545a065421aea5394c9e3ee2fe5a275e1792a5596663846fd9397c4f34d0a333a089333eedc20b06bd194a7323e57de90a80482ee28ef954e71630a5a08832c7bcf5", 0xe2}], 0x3, 0x0, 0x0, 0x40}, 0x800) [ 395.091808][T18356] input: syz0 as /devices/virtual/input/input382 [ 395.137520][T18384] binder: 18380:18384 unknown command 0 [ 395.183056][T18384] binder: 18380:18384 ioctl c0306201 200001c0 returned -22 [ 395.238209][T18393] binder: 18380:18393 unknown command 0 22:41:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:32 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) [ 395.292409][T18393] binder: 18380:18393 ioctl c0306201 200001c0 returned -22 22:41:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f0000000080)="0000d2b953a0bd09412a51ad", 0xfffffffffffffcb3) r2 = fcntl$dupfd(r1, 0x406, r1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040)=0x5, 0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f00000000c0)={0x7, 0x10100000, 0xe083, 0x0, 0x0, [], [], [], 0x0, 0x1}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000200)=0x1, 0x4) 22:41:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00'}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) 22:41:32 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x6c}], 0x0, 0x0, 0x0}) [ 395.522296][T18405] FAT-fs (loop1): bogus number of reserved sectors 22:41:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) [ 395.599923][T18411] binder: 18407:18411 unknown command 0 [ 395.606503][T18405] FAT-fs (loop1): Can't find a valid FAT filesystem 22:41:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = dup(r0) getdents64(r1, &(0x7f0000000080)=""/63, 0x3f) r2 = socket$inet(0x2, 0x3, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) epoll_create(0xb1f) write(r2, &(0x7f0000000040)="06000000000000000000008d", 0xc) [ 395.652036][T18411] binder: 18407:18411 ioctl c0306201 200001c0 returned -22 [ 395.697716][T18420] binder: 18407:18420 unknown command 0 22:41:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000100)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'erspan0\x00', 0x7c}) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000480)="1e0684604d762c36df739cad97b99057adee42fc5928a7428050f17a3de5ea5a2aa067e170a3ad4120c473f1c4d466203027dd5e79b6d254a37b343baad9995b5fb3d58e67378e7d32ca0e1a80f7f861804323ac871167a235211398c947676da2648da866de4bc37fe981e83582c3e9faae8608f9348a3459bec9afe0a84bfb282e63d8c7035b562c07fc4c8193dd6d2bfb04a28d9ea22d", 0x98, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1af) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x3, "0b5bd94bb4cef0c2"}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000900)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000005c0)={'syz'}, 0x0) [ 395.764515][T18420] binder: 18407:18420 ioctl c0306201 200001c0 returned -22 [ 395.836703][T18405] input: syz0 as /devices/virtual/input/input384 22:41:32 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xfe47, 0x0, &(0x7f00000000c0)=[@release={0x400c630f, 0x74}], 0x0, 0x0, 0x0}) [ 395.885652][T18422] input: syz0 as /devices/virtual/input/input385 22:41:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x84) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write(r1, &(0x7f00000000c0)="0008df0000", 0xfffffc49) 22:41:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x100000c1004111, &(0x7f0000000440)="bca572f7593af6ddddaf40e5da") [ 395.975352][T18434] FAT-fs (loop3): invalid media value (0x00) [ 396.003732][T18434] FAT-fs (loop3): Can't find a valid FAT filesystem [ 396.089640][T18441] binder: 18439:18441 unknown command 0 [ 396.124494][T18441] binder: 18439:18441 ioctl c0306201 200001c0 returned -22 [ 396.196974][T18449] binder: 18439:18449 unknown command 0 22:41:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000004980)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000038c0)=""/4096, 0x1000}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/21, 0xfffffded}], 0x100000000000000c) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f00000018c0)=""/152, 0x98}], 0x1000000000000210, 0x0, 0xffffffffffffffcc}, 0x0) r6 = dup(r5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r7, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r6, 0x0) r8 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r8, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/35, 0x23}], 0x1) shutdown(r7, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 396.238678][T18449] binder: 18439:18449 ioctl c0306201 200001c0 returned -22 [ 396.281142][T18451] ------------[ cut here ]------------ [ 396.287171][T18451] refcount_t: increment on 0; use-after-free. [ 396.293664][T18451] WARNING: CPU: 0 PID: 18451 at lib/refcount.c:156 refcount_inc_checked+0x61/0x70 [ 396.302849][T18451] Kernel panic - not syncing: panic_on_warn set ... [ 396.309419][T18451] CPU: 0 PID: 18451 Comm: syz-executor.3 Not tainted 5.2.0-rc7 #39 [ 396.317288][T18451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.327424][T18451] Call Trace: [ 396.330703][T18451] dump_stack+0x172/0x1f0 [ 396.335016][T18451] ? refcount_inc_not_zero_checked+0x190/0x200 [ 396.341237][T18451] panic+0x2cb/0x744 [ 396.345115][T18451] ? __warn_printk+0xf3/0xf3 [ 396.349685][T18451] ? refcount_inc_checked+0x61/0x70 [ 396.354862][T18451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.361079][T18451] ? __warn.cold+0x5/0x4d [ 396.365388][T18451] ? refcount_inc_checked+0x61/0x70 [ 396.370563][T18451] __warn.cold+0x20/0x4d [ 396.374789][T18451] ? refcount_inc_checked+0x61/0x70 [ 396.379965][T18451] report_bug+0x263/0x2b0 [ 396.384279][T18451] do_error_trap+0x11b/0x200 [ 396.388852][T18451] do_invalid_op+0x37/0x50 [ 396.393243][T18451] ? refcount_inc_checked+0x61/0x70 [ 396.398467][T18451] invalid_op+0x14/0x20 [ 396.402602][T18451] RIP: 0010:refcount_inc_checked+0x61/0x70 [ 396.408561][T18451] Code: 1d de 5a 48 06 31 ff 89 de e8 cb 53 3c fe 84 db 75 dd e8 82 52 3c fe 48 c7 c7 20 9d a4 87 c6 05 be 5a 48 06 01 e8 9d 8b 0e fe <0f> 0b eb c1 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 41 [ 396.428144][T18451] RSP: 0018:ffff88805b5878b8 EFLAGS: 00010282 [ 396.434184][T18451] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 396.442135][T18451] RDX: 0000000000011030 RSI: ffffffff815adb36 RDI: ffffed100b6b0f09 [ 396.450082][T18451] RBP: ffff88805b5878c8 R08: ffff888058cd8180 R09: ffff888058cd8a20 [ 396.458030][T18451] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888096b752f8 [ 396.465980][T18451] R13: 0000000000000000 R14: ffff888090a97580 R15: ffff88809a4a0480 [ 396.473946][T18451] ? vprintk_func+0x86/0x189 [ 396.478515][T18451] ? refcount_inc_checked+0x61/0x70 [ 396.483691][T18451] kobject_get+0x66/0xc0 [ 396.487917][T18451] cdev_get+0x60/0xb0 [ 396.491878][T18451] chrdev_open+0xb0/0x6b0 [ 396.496189][T18451] ? cdev_put.part.0+0x50/0x50 [ 396.500934][T18451] ? security_file_open+0x87/0x300 [ 396.506027][T18451] do_dentry_open+0x4df/0x1250 [ 396.510776][T18451] ? kasan_check_read+0x11/0x20 [ 396.515619][T18451] ? cdev_put.part.0+0x50/0x50 [ 396.520366][T18451] ? chown_common+0x5c0/0x5c0 [ 396.525024][T18451] ? inode_permission+0xb4/0x560 [ 396.529943][T18451] vfs_open+0xa0/0xd0 [ 396.533905][T18451] path_openat+0x10e9/0x46d0 [ 396.538472][T18451] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 396.544267][T18451] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 396.549624][T18451] ? __alloc_fd+0x44d/0x560 [ 396.554108][T18451] do_filp_open+0x1a1/0x280 [ 396.558594][T18451] ? may_open_dev+0x100/0x100 [ 396.563253][T18451] ? kasan_check_read+0x11/0x20 [ 396.568083][T18451] ? do_raw_spin_unlock+0x57/0x270 [ 396.573174][T18451] ? _raw_spin_unlock+0x2d/0x50 [ 396.578002][T18451] ? __alloc_fd+0x44d/0x560 [ 396.582489][T18451] do_sys_open+0x3fe/0x5d0 [ 396.586887][T18451] ? filp_open+0x80/0x80 [ 396.591115][T18451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.596555][T18451] ? do_syscall_64+0x26/0x680 [ 396.601213][T18451] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.617252][T18451] ? do_syscall_64+0x26/0x680 [ 396.622174][T18451] __x64_sys_open+0x7e/0xc0 [ 396.626656][T18451] do_syscall_64+0xfd/0x680 [ 396.631148][T18451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.637020][T18451] RIP: 0033:0x413401 [ 396.640893][T18451] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 396.660474][T18451] RSP: 002b:00007fb0818fa7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 396.668863][T18451] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413401 [ 396.676812][T18451] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00007fb0818fa850 [ 396.684763][T18451] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 396.692712][T18451] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fb0818fb6d4 [ 396.700662][T18451] R13: 00000000004c86a8 R14: 00000000004df230 R15: 00000000ffffffff [ 396.710075][T18451] Kernel Offset: disabled [ 396.714552][T18451] Rebooting in 86400 seconds..