_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x4c, r5, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xda}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x401}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x80) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r6, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1887.084232] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000000)='gre0\x00'}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 09:50:19 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1887.240377] minix_free_inode: bit 1 already cleared [ 1887.268817] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1887.398509] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1887.420201] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:19 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x306, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000d658f0c53fe71618990003000000000000080006000000132a00000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:19 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:19 executing program 3: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x8000, 0xb, 0x4, 0x40000, 0x5, {0x77359400}, {0x5, 0x0, 0x6, 0x1, 0x3f, 0x9, "8b993d04"}, 0xde1, 0x2, @offset=0xb52a, 0x4, 0x0, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080), 0x8) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000000c0)=""/93) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/vlan/config\x00') r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa4, r2, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:mqueue_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:v4l_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000802}, 0x4010) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x11c, r3, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x38, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x800000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}]}, @TIPC_NLA_NODE={0x28, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6ba}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x75}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fff}]}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r4 = syz_open_dev$media(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x10002) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f00000005c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) ptrace$getregs(0xe, r5, 0x5, &(0x7f0000000640)=""/3) r6 = dup3(r4, r1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=@setneightbl={0x44, 0x43, 0x800, 0x70bd29, 0x25dfdbfb, {0x1c}, [@NDTA_THRESH1={0x8, 0x2, 0x6}, @NDTA_GC_INTERVAL={0xc, 0x8, 0x5}, @NDTA_NAME={0x5, 0x1, '\x00'}, @NDTA_NAME={0xb, 0x1, 'TIPCv2\x00'}, @NDTA_NAME={0x5, 0x1, '\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x41) r7 = creat(&(0x7f00000007c0)='./file0\x00', 0x3) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000800)=0x1ff, 0x4) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0}, &(0x7f0000000a80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000ac0)={'team0\x00', r8}) r9 = accept4$packet(0xffffffffffffffff, &(0x7f0000000b00), &(0x7f0000000b40)=0x14, 0x0) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) [ 1887.640246] minix_free_inode: bit 1 already cleared [ 1887.693591] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1887.785788] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1887.815000] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000180)={@any, 0x8, 0x1, 0x6}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x300, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x167, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x3018, 0x0, 0x10000000, 0x93feb629adc28a91, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$fb(r2, &(0x7f0000000280)=""/118, 0x76) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8ab80, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000006c0)=ANY=[@ANYBLOB="086f453d2ccd8ea1ff3246dfe13e493cc59df627b424182443f6f75007d2e96208995358bc5a97364d0733e1b0ce9b000000000000000000000000001800006fc072935195a3a9b987606d41c1f38ce7fe9f5814dae35b056df2f014402cd101c198178c0e22e7b521bc5d2f935353725c1dae9e21b29d5166a399803b0ad74123c0eaacc391650740744a8a3def13f0f2a63d3af01b03acfa382f7dc0b72a9b840737a8d2e6abc2ee9dce75119dfe16daf70202", @ANYRES16=r4, @ANYBLOB="000826bd7000fbdbdf25040000b18e00dc1800949400000031000100000008003c003b4391df08002f000220007de700280003000000306eb175f7b988c214657544032bec3c2ff2643109ecae33fe09f39a54eed27fe21ca5e87a91e105e4d55851e53a5561835fced7b497a09c73c89da208946320eac4678b33595d835da4d9d7b9a21fffca2bab0b32ed5551695a5a37b1db36a77abb010000001abbf07283e386f698330a6ef32e2e5cb07b90c06ac518007f2612060eb54754bcafbafcc7648f6145abcb16ad0f660eccee7225a99d212f5d8ec36543b602420d0bcdbb492cb2"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008010) msgget$private(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 09:50:19 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:19 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00', 0x2000}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) ioctl$FICLONE(r0, 0x40049409, r2) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r6, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r3, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1887.960876] minix_free_inode: bit 1 already cleared [ 1888.081434] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:20 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x303, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1888.154752] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000180)={@any, 0x8, 0x1, 0x6}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x300, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x167, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x3018, 0x0, 0x10000000, 0x93feb629adc28a91, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$fb(r2, &(0x7f0000000280)=""/118, 0x76) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8ab80, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000006c0)=ANY=[@ANYBLOB="086f453d2ccd8ea1ff3246dfe13e493cc59df627b424182443f6f75007d2e96208995358bc5a97364d0733e1b0ce9b000000000000000000000000001800006fc072935195a3a9b987606d41c1f38ce7fe9f5814dae35b056df2f014402cd101c198178c0e22e7b521bc5d2f935353725c1dae9e21b29d5166a399803b0ad74123c0eaacc391650740744a8a3def13f0f2a63d3af01b03acfa382f7dc0b72a9b840737a8d2e6abc2ee9dce75119dfe16daf70202", @ANYRES16=r4, @ANYBLOB="000826bd7000fbdbdf25040000b18e00dc1800949400000031000100000008003c003b4391df08002f000220007de700280003000000306eb175f7b988c214657544032bec3c2ff2643109ecae33fe09f39a54eed27fe21ca5e87a91e105e4d55851e53a5561835fced7b497a09c73c89da208946320eac4678b33595d835da4d9d7b9a21fffca2bab0b32ed5551695a5a37b1db36a77abb010000001abbf07283e386f698330a6ef32e2e5cb07b90c06ac518007f2612060eb54754bcafbafcc7648f6145abcb16ad0f660eccee7225a99d212f5d8ec36543b602420d0bcdbb492cb2"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008010) msgget$private(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 1888.240475] minix_free_inode: bit 1 already cleared 09:50:20 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1888.281529] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1888.338418] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:20 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x303, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1888.450510] minix_free_inode: bit 1 already cleared 09:50:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000180)={@any, 0x8, 0x1, 0x6}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x300, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x167, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x3018, 0x0, 0x10000000, 0x93feb629adc28a91, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$fb(r2, &(0x7f0000000280)=""/118, 0x76) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8ab80, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000006c0)=ANY=[@ANYBLOB="086f453d2ccd8ea1ff3246dfe13e493cc59df627b424182443f6f75007d2e96208995358bc5a97364d0733e1b0ce9b000000000000000000000000001800006fc072935195a3a9b987606d41c1f38ce7fe9f5814dae35b056df2f014402cd101c198178c0e22e7b521bc5d2f935353725c1dae9e21b29d5166a399803b0ad74123c0eaacc391650740744a8a3def13f0f2a63d3af01b03acfa382f7dc0b72a9b840737a8d2e6abc2ee9dce75119dfe16daf70202", @ANYRES16=r4, @ANYBLOB="000826bd7000fbdbdf25040000b18e00dc1800949400000031000100000008003c003b4391df08002f000220007de700280003000000306eb175f7b988c214657544032bec3c2ff2643109ecae33fe09f39a54eed27fe21ca5e87a91e105e4d55851e53a5561835fced7b497a09c73c89da208946320eac4678b33595d835da4d9d7b9a21fffca2bab0b32ed5551695a5a37b1db36a77abb010000001abbf07283e386f698330a6ef32e2e5cb07b90c06ac518007f2612060eb54754bcafbafcc7648f6145abcb16ad0f660eccee7225a99d212f5d8ec36543b602420d0bcdbb492cb2"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008010) msgget$private(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 1888.577905] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:20 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:20 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb", 0x303, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1888.671669] minix_free_inode: bit 1 already cleared [ 1888.799979] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:20 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x306, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:20 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1888.940869] minix_free_inode: bit 1 already cleared 09:50:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) poll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {0xffffffffffffffff, 0x9485}, {}, {0xffffffffffffffff, 0x12a6}], 0x9, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x60, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000004c0)={&(0x7f0000000000), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x98, r4, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x40}, 0x48000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004a40)=""/243, 0xf3}}], 0x2, 0x0, 0x0) write$sndseq(r1, &(0x7f00000000c0), 0x0) [ 1889.082751] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:21 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x306, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1889.185851] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1889.210345] minix_free_inode: bit 1 already cleared 09:50:21 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1889.307607] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) socket(0x11, 0x800000003, 0x400) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055af64678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x41000, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000000)=0xfffffdf8) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=r6, @ANYRES32=r7], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x24048054) writev(r1, &(0x7f00000001c0), 0x0) 09:50:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) poll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {0xffffffffffffffff, 0x9485}, {}, {0xffffffffffffffff, 0x12a6}], 0x9, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x60, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000004c0)={&(0x7f0000000000), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x98, r4, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x40}, 0x48000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004a40)=""/243, 0xf3}}], 0x2, 0x0, 0x0) write$sndseq(r1, &(0x7f00000000c0), 0x0) 09:50:21 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x306, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:21 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video35\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c000000300001000000000000000000000000003800010034000100080001006270660024000280060003000000000038000200a50000000000000000000000000000000000736926c40600"], 0x4c}}, 0x0) fcntl$addseals(r0, 0x409, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getpriority(0x1, 0x0) setresuid(0x0, 0x0, 0x0) quotactl(0x6, &(0x7f0000000380)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRES32, @ANYBLOB="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", @ANYRES32], 0x1e0}}, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000003c0)) rmdir(&(0x7f00000000c0)='./bus/file0\x00') [ 1889.450363] minix_free_inode: bit 1 already cleared 09:50:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xa8, 0x30, 0x1, 0x0, 0x0, {}, [{0x94, 0x1, [@m_sample={0x90, 0x20, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x9}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x6, 0x6, 0x40ec0000, 0xff}}]}, {0x5c, 0x6, "1f5b463273f5ac7d80c90f0444014feed5e450d6ac16068f4f3b1e8e75fd8da52623bf4d9a6850ea51dbc5e88c3eb81fde5a029a8ad8dc1fa7fc03ed14509dc457a723cf294e34713af7816610b52348f34a04ad504ef3b3"}}}]}]}, 0xa8}}, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000280), 0x2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r6, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r3, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r7 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r7, r8, r8}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={'xcbc(anubis-generic)\x00'}}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r7, 0x28, 0x1000}, 0x0, &(0x7f0000000140)="3eebd627882bc3569ed1789dde10493dc2939ca9cc5f703d6f5815226452e74515bb854955f3493a", &(0x7f0000000780)=""/4096) [ 1889.631276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1889.657251] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:21 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1889.694387] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 09:50:21 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1889.754589] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1889.773475] kauditd_printk_skb: 20 callbacks suppressed [ 1889.773484] audit: type=1800 audit(8032384221.641:508): pid=10039 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15832 res=0 [ 1889.799548] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1889.810417] minix_free_inode: bit 1 already cleared [ 1889.826505] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 1889.842753] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 09:50:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb07, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x587}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x2) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000001280)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={0x0, 0x7, 0xd3}, 0x0, &(0x7f0000000280)="b80be3e471b2e1", &(0x7f00000002c0)=""/211) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="000080000e25d627f1b638b931e13b8609fba84623df0600b04acf5d73d4382e32", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r4, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r4, 0x4}, 0x8) [ 1889.900316] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1889.964810] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1889.968270] audit: type=1800 audit(8032384221.801:509): pid=10050 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=15837 res=0 09:50:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="2800ffec", @ANYBLOB="5d3075467aed9bb4f3fcb66ff52317eac20338c26003356079bb462d412246c373f5f095cea586e783a8125b00d64fd6d9995c800d5418fb5c6dcf026a07368db11885ac2e4d67af335dcbc9838ebd6b665eb1274bfa2a21c2cddd18f3a956f584c043f6ded40b2c3474c1d7708e023af701abafaf7582e19a3b25d205d56e94acb3df055d58bbfecfb1b1f40fa66af130f6a1296d7af763180e14f6f70a4b1cc5b2b866baf6f7f6b244e53b9a98f95c59055ce1db951ca38c565d92082749a56e5e0cff7b538d14c06f138c5e3912aafedb1364ecf4a94c4a77fa0e5891f16c6cad2de7467e", @ANYBLOB="0002000000c557a0cc11c8cab00fe788437cef2490221237491a0a7a23414ab95f0000000c009900030000000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:21 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:21 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002e000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f32f00fb30f0f309a0900000065002ed8ddc74424008f6dc4bd8787442402c43a727fc7442406000000000f35f30f090f013ac4c18d72d683b9070200000f32ed", 0x46}], 0x1, 0x4, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x1fd, 0x2, 0x0, 0x2000, &(0x7f0000037000/0x2000)=nil}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x8, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00800011b1fb0000950000000000000096080000000000a99d109e230000", @ANYRES32, @ANYBLOB="000040007f00000095000000000000009500000000000000182701000aca1080a40f252d4c7dfc2241c195887e57ea72feaa3ad767eef4145b9841ae9d6a4f764d519aef26f0ac97a3973aaf90fc470fb49cbf39ca1340498a32c6ffc2ea87234b271d806ba9921bda4585b738bfd922a3f1acc7d0fa6e09cc66f7158d2547ad20332f591fbcea886c6b6fd98079411aad197f9a3bd6a44f33c12d7207d6a2e1d1b0e0000000000000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r7}, 0x78) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1890.111445] minix_free_inode: bit 1 already cleared [ 1890.119097] audit: type=1800 audit(8032384221.981:510): pid=10062 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15831 res=0 [ 1890.186956] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1890.216689] audit: type=1800 audit(8032384222.071:511): pid=10069 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16290 res=0 09:50:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000140)="0f07b9800000c00f3235002000000f30ba000000000f30c4817e11a000000000c744240006010000c74424024259e6e5ff2c246764460f01cb450f01c4b9ba0300000f32b9160800000f32400f01c90f320f01c2440f20c03501000000440f22c0", 0x61}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000240)={0x1, 0x2, 0x4, 0x1, 0x6, {}, {0x2, 0x2, 0x2, 0x0, 0x3f, 0x3, "6572a640"}, 0x75c6ec62, 0x4, @planes=&(0x7f0000000000)={0x73d, 0x1, @fd=r3, 0xfff00000}, 0x1, 0x0, 0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r4, 0xb101, 0x0) [ 1890.281940] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1890.306024] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:22 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x21, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="8df787deaba0eb8743e2c44a286af38920e4e2fb1226d232da8aebec453707f75516406f4d2133ff16c425ef781ada8ecf3a05ef6447359682aa96ae5364930f415d38259c51ae3dd5b726eac81d52b746c58120479ce9a472c28f96496a8f442b43fcb603b4e0e2970d5a826964de1b150e71c5fa2d49f0f4d82d3c5424dc27d0b520db0d61d77fdbdad97fd62d7e7436", @ANYRES16, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000100)={0x990000, 0x9d7, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0xa30901, 0x7fff, [], @value=0x7fffffff}}) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1890.414232] audit: type=1800 audit(8032384222.181:512): pid=10077 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.1" name="bus" dev="sda1" ino=15836 res=0 09:50:22 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500e967f108100e9503e4b4090008000c0006e1ffff2e0015000410000000000000000000000000004000"/57, 0x39}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="390000001300090417feb10000000010141900040500"/35, 0x23}], 0x1) r2 = socket(0x10, 0x80002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xffffffffffffffff, r6, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000540)='encrypted\x00', &(0x7f0000000580)={'syz', 0x3}, r6) mmap$dsp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x800000, 0x1010, r3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x3, 0x0, &(0x7f0000000100), 0x2, &(0x7f0000000100)}], 0x4924924924926e4, 0x0) [ 1890.520552] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:22 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1890.590707] audit: type=1800 audit(8032384222.341:513): pid=10094 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15836 res=0 [ 1890.622569] minix_free_inode: bit 1 already cleared 09:50:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c00000030000000000000000000000038000100340018000200000400000000000000000000000000000000000004000600"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9127ffec", @ANYRES16=r4, @ANYRESOCT=r5], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x100000003, 0x3a) recvmsg$can_bcm(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000000)=""/50, 0x32}, {&(0x7f0000000040)=""/55, 0x37}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/62, 0x3e}, {&(0x7f00000011c0)=""/205, 0xcd}, {&(0x7f00000000c0)=""/113, 0x71}, {&(0x7f0000000140)=""/59, 0x3b}], 0x7, &(0x7f0000001340)=""/99, 0x63}, 0x100) sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}, 0x7fc}, 0x1c) 09:50:22 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') getdents(r0, &(0x7f00000020c0)=""/45, 0x2d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r1, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r2, r3}, 0x78) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x5) [ 1890.794550] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1890.819102] audit: type=1800 audit(8032384222.681:514): pid=10120 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=15830 res=0 [ 1890.861606] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1890.911472] audit: type=1800 audit(8032384222.701:515): pid=10121 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15838 res=0 09:50:22 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x43, &(0x7f0000000000), &(0x7f0000000040)=0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:22 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) syz_mount_image$xfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000240)}, {&(0x7f00000003c0)}, {&(0x7f0000000580)="b31ef615acc84712720a80d486e284ec858c28bbc30ad8317ad6dec33553fd5f3427215438b53b4d84d57fd850e463372f9d", 0x32}], 0x22080, &(0x7f0000000a40)=ANY=[@ANYBLOB='dax,smackfsroot=!,ui', @ANYRESDEC=0x0, @ANYRESDEC]) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f0000000740)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000500)) mount$9p_unix(&(0x7f0000000040)='./bus\x00', &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='9p\x00', 0x1010400, &(0x7f0000000680)={'trans=unix,', {[{@msize={'msize', 0x3d, 0x7}}, {@loose='loose'}, {@cachetag={'cachetag'}}, {@loose='loose'}, {@cache_loose='cache=loose'}, {@noextend='noextend'}], [{@permit_directio='permit_directio'}, {@smackfsroot={'smackfsroot', 0x3d, 'vboxnet0&'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x1, 0xff, 0x8, 0x0, 0x7ffd, 0x4308, 0xd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x100000000000de, 0x4}, 0x1088, 0xfffffffffffffffe, 0x4, 0x1, 0x5, 0x7fffffff, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x7) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r4) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x100000, r4, 0x9}) [ 1891.014237] minix_free_inode: bit 1 already cleared 09:50:22 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1891.085153] audit: type=1804 audit(8032384222.951:516): pid=10138 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir992028684/syzkaller.wCUNEM/1810/bus" dev="sda1" ino=15873 res=1 [ 1891.115564] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1891.157994] audit: type=1800 audit(8032384223.011:517): pid=10143 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16294 res=0 [ 1891.208475] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1891.225688] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f0000000000)=""/37) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c009900030700000000000008000100020000003cb879859d08e77220e490b437d268a6543889f7990761efd214a9767c"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r6}, 0x78) accept$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000140)={@multicast2, @multicast2, r7}, 0xc) 09:50:23 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1891.380637] minix_free_inode: bit 1 already cleared 09:50:23 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1891.454282] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1891.513276] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1891.539389] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c0000000f06050900eeffffff0000000100000a0500010007000000050001000700000005000100070000000500010001000700000006000b000400"/76], 0x4c}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) 09:50:23 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}, 0x4}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x9) socket(0x0, 0x4, 0x40) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="9ad9807ff2042e04c0926df0161492abf946367b2a5b888bfc624d46246672589609433a03f09ea34291f61f8cf02dd5552105185c032f84d23028525f71ce5963fb009a40ed4f3c496aac4b0b73f1117c1a43d04a5196626eff222d7c1beecfcb28466bed996355495213023dd2f9dd3f0c88c5fd334b469b46f882feacc619b26ea2ea7bd43ba273677303a364785c9b879a856155155c21408d", @ANYRES16=r4, @ANYBLOB="200025bd7000fe800000000000000000000000000030c42c14000200fc01000000000000000000000000000100"/56], 0x3c}}, 0x4) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x8, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x8000000200036150, 0x800007b, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) 09:50:23 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'lo\x00'}) r0 = socket(0x11, 0x800000003, 0x400) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000540)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xfffffffffffffffc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r5, r6}, 0x78) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000000)) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5bd524e3b0f7194b30542e214c3a57a03c492eef00a7c7fa3d272969c172b1366a2f247f5561", @ANYRES16=r4, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1891.670468] minix_free_inode: bit 1 already cleared 09:50:23 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:23 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x40000000001e, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x8, &(0x7f00000000c0), 0x8) r6 = dup2(r5, r1) dup3(r6, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000007ad6ad95e00000040000000197a0000ffffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r7}, 0x78) setsockopt$inet_opts(r7, 0x0, 0x9, &(0x7f0000000080)="cc57b979540087bab064b7b8c29d3b4e850edfb7e5998ba82e4f33d4960b80ea9263e3278c66bee4fc5260ef8e2a2fcaebe3d738c9a07d4e78d4d04e0452", 0x3e) 09:50:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000ec", @ANYRES16=r4, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:23 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000000)={'xfrm0\x00', 0x3}) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x200, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x5, 0xa, 0x10}, @IFLA_IFNAME={0x31, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e, 0x0, 0x40080}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x9, {{0xa, 0x4e23, 0x5, @empty, 0x2}}, 0x1, 0x7, [{{0xa, 0x4e20, 0x3, @loopback, 0x3f}}, {{0xa, 0x4e24, 0x3, @empty, 0x7fff}}, {{0xa, 0x4e20, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3}}, {{0xa, 0x4e23, 0x1, @private2, 0xfffffffd}}, {{0xa, 0x4e23, 0x8000, @loopback, 0x7}}, {{0xa, 0x4e23, 0x0, @remote, 0x7fff}}, {{0xa, 0x4e24, 0x8000, @rand_addr=' \x01\x00', 0xfffffc00}}]}, 0x410) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 09:50:24 executing program 3: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0400eeffffffffff4a560c78000051151103fa3800d604002000020000000000"], 0x2c, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000180)='./file0/file0\x00'}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r3}, 0x78) ioctl$TIOCCONS(r3, 0x541d) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000380)=0xac, 0x4) recvfrom$unix(r0, &(0x7f0000000200)=""/68, 0x44, 0x0, &(0x7f0000000280)=@file={0x0, './file0/file0\x00'}, 0x6e) 09:50:24 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1892.253376] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:24 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) ioctl$FITHAW(r2, 0xc0045878) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r3}, 0x78) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000800)={0x0, 0x0, 0x9, 0x0, [], [{0x8, 0x7, 0x7, 0x400000000000000, 0x57f7, 0x5}, {0x6, 0x6, 0x188, 0x9, 0x8, 0xb2}], [[], [], [], [], [], [], [], [], []]}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000580)={0x3, 0x0, [{0x40000000, 0x469c79f7, 0x4e6f2894, 0x9, 0x5}, {0x4000000f, 0x6e, 0x3ff, 0x3ff, 0x3f}, {0x40000000, 0x7, 0x1, 0xfff, 0x5}]}) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r1, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r3, r4}, 0x78) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x28, r5, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x2500}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000040)={0x230, r5, 0x8, 0x70bd26, 0x101, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x93a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9fa}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5f4d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x68b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x10000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x10001}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc4}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x39}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xdc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}]}, @TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4a39fe08}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4004010}, 0xc000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x8, 0x3, 0x210, 0xc0, 0x0, 0xc0, 0x0, 0xc0, 0x178, 0x178, 0x178, 0x178, 0x178, 0x3, 0x0, {[{{@ip={@remote, @dev, 0x0, 0x0, 'macvlan1\x00', 'ip_vti0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@socket1={{0x28, 'socket\x00', 0x3}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x125}}, {{@ip={@remote, @remote, 0x0, 0x0, 'macvlan0\x00', 'veth1_to_hsr\x00'}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x270) 09:50:24 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000900)='hfsplus\x00', 0x2000c08, &(0x7f0000000940)='syzkaller\x00') ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000640)={0x6, 0x6, [{0x800, 0x0, 0x6}, {0x0, 0x0, 0x2}, {0x1ff, 0x0, 0x7}, {0x1, 0x0, 0x3}, {0x8, 0x0, 0x4}, {0xfffffff7, 0x0, 0x2}]}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000000)={0x3, 0x10000}) [ 1892.507891] Bearer rejected, not supported in standalone mode [ 1892.550970] SELinux: unknown mount option 09:50:24 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1892.627221] hfsplus: unable to parse mount options [ 1892.673432] SELinux: unknown mount option [ 1892.686232] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:24 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:24 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000900)='hfsplus\x00', 0x2000c08, &(0x7f0000000940)='syzkaller\x00') ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000640)={0x6, 0x6, [{0x800, 0x0, 0x6}, {0x0, 0x0, 0x2}, {0x1ff, 0x0, 0x7}, {0x1, 0x0, 0x3}, {0x8, 0x0, 0x4}, {0xfffffff7, 0x0, 0x2}]}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000000)={0x3, 0x10000}) 09:50:24 executing program 1: socket$unix(0x1, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x0, 0x8000}) ioctl$FITRIM(r3, 0xc0185879, &(0x7f00000000c0)={0x0, 0xffffffff}) 09:50:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = dup(0xffffffffffffffff) r8 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="00040000", @ANYRES16=r8, @ANYBLOB="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", @ANYRES64, @ANYRESOCT=r6, @ANYBLOB, @ANYRES16=0x0, @ANYRESHEX=r5, @ANYRES32], 0x24}, 0x1, 0x0, 0x0, 0xc890}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r8, 0x1, 0x70bd27, 0x25dfdbfd}, 0x14}}, 0x80) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x38, r8, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x401}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}]}, 0x38}, 0x1, 0x0, 0x0, 0x20044000}, 0x80) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r9, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r10 = semget$private(0x0, 0x3, 0x2bb) semctl$IPC_RMID(r10, 0x0, 0x0) 09:50:24 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000900)='hfsplus\x00', 0x2000c08, &(0x7f0000000940)='syzkaller\x00') ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000640)={0x6, 0x6, [{0x800, 0x0, 0x6}, {0x0, 0x0, 0x2}, {0x1ff, 0x0, 0x7}, {0x1, 0x0, 0x3}, {0x8, 0x0, 0x4}, {0xfffffff7, 0x0, 0x2}]}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000000)={0x3, 0x10000}) [ 1892.836821] SELinux: unknown mount option 09:50:24 executing program 1: mlockall(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') sync() [ 1892.936267] SELinux: unknown mount option 09:50:24 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:24 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000900)='hfsplus\x00', 0x2000c08, &(0x7f0000000940)='syzkaller\x00') ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000640)={0x6, 0x6, [{0x800, 0x0, 0x6}, {0x0, 0x0, 0x2}, {0x1ff, 0x0, 0x7}, {0x1, 0x0, 0x3}, {0x8, 0x0, 0x4}, {0xfffffff7, 0x0, 0x2}]}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000000)={0x3, 0x10000}) [ 1892.991673] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1893.107651] SELinux: unknown mount option [ 1893.125154] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:25 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:25 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000000040), 0x2) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x40000, 0x0) fsync(r0) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='*^posix_acl_access)lokeyring\x00', r1) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="869e7f38094f8030b0247712a91fe25ae8db5c96e5c022a882b1968974884a33c7d9bf99f5660f311fc91b335f7903760813986313140190141de80893d8b5787118f40da45e4f03aeaf2650465d1df419f219d7510537577f6b27c7b105d957a0957c397911524afaa729e31c3e9516165d265282e3d482", 0x78, r2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000000c0)) 09:50:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r6 = open(&(0x7f0000000000)='./file0\x00', 0x80800, 0x20) write$ppp(r6, &(0x7f0000000300)="2a5ec4f6fc48c4940294facc170c48f54f13face97579742943bf6169e7732f2b5714b9dfa7b28e1ed6e7c028519c705a914fe8e2d89eebdc95044d123bee8d3e596465db59613966c8328ea281f5bcdb81f5b4c7b2c0ed27605ea3a2dd77b4dc52061a33f98bc68ab774f2ce23dba5a7e8e8f08ff1080a4713f1e1bd0b2354491ab2736b054db122599629a970864670fb13453c3a16f8a1188edfb6c080858d66df4c4133941", 0xa7) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:25 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000900)='hfsplus\x00', 0x2000c08, &(0x7f0000000940)='syzkaller\x00') ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000640)={0x6, 0x6, [{0x800, 0x0, 0x6}, {0x0, 0x0, 0x2}, {0x1ff, 0x0, 0x7}, {0x1, 0x0, 0x3}, {0x8, 0x0, 0x4}, {0xfffffff7, 0x0, 0x2}]}) [ 1893.254688] hfsplus: unable to parse mount options [ 1893.304229] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1893.380853] SELinux: unknown mount option 09:50:25 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:25 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1893.409974] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:25 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000900)='hfsplus\x00', 0x2000c08, &(0x7f0000000940)='syzkaller\x00') 09:50:25 executing program 5: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec2038ad9055ae44678b76ff6eb4d2db023d489f5739fe932a52444ea13c0766c52c90124ebd362d46b939b534acc28e1ff0f1e39f1cfb80dde2d9f1d988f2a5ccdde0b132858e5dc4e92aa932c9af5892e1fb958949749208bd48cd080e892817a9577de47115174478fa78fbdc0befea55c427917d0ee6140ebb974367a5533439ecd12b1"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r0}, 0x78) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000300)={0x8001007, 0x20, 0x2}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'lo\x00'}) r2 = socket(0x11, 0x800000003, 0x400) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair(0x6, 0x80000, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x28, 0x3f7, 0x200, 0x70bd25, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1893.476395] hfsplus: unable to parse mount options [ 1893.494134] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1893.568460] SELinux: unknown mount option [ 1893.628294] hfsplus: unable to parse mount options [ 1893.639290] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:25 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000900)='hfsplus\x00', 0x2000c08, &(0x7f0000000940)='syzkaller\x00') 09:50:25 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1893.753788] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1893.818581] SELinux: unknown mount option 09:50:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="0002000000000000000020f097000c009900f128050000008325748cfe3082c2519f92670000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:25 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000900)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x1, 0x2}, 0x10, r2, r3}, 0x78) [ 1893.910570] hfsplus: unable to parse mount options 09:50:25 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1893.984288] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1894.030547] SELinux: unknown mount option [ 1894.042355] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1894.101454] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:26 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:26 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) [ 1894.262574] SELinux: unknown mount option [ 1894.282029] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 09:50:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) socket$nl_route(0x10, 0x3, 0x0) 09:50:26 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5fff7ff16f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x21, 0x800, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r6 = socket(0x1f, 0xa, 0x6) close(r6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r7, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r7}, &(0x7f0000000080)=0x8) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000300)={0x200, 0x40}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000001c0)={r7, 0xff}, &(0x7f0000000280)=0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x410200, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000040)="3900000013e1c3e4ffff06008a0005190004000400000007fd17e5ffba0606040001000000000000f6ffb1000000", 0x2e}, {&(0x7f00000015c0)="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", 0xfb}, {&(0x7f0000000480)="83ac9122a629b54f6dd1e1e9c41b0953150dcdd7dc79c7dc609dd45aebae5d8dab61c303164d168b38d87a03ef26340330d9518008ac70e2f42bae5618233af3d2659cc50479228256610048af0be80bc8ec1143bfc8cb1016a35c1eca5351141d38e8c48cacffd4db908b1e101fa9f0ea348d9de23e5bcf142c20bfcf87c5eebc7d7e758c000000", 0x88}, {&(0x7f00000016c0)="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", 0x107d}], 0x4) [ 1894.502709] SELinux: unknown mount option 09:50:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1894.534325] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1894.562796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57619 sclass=netlink_route_socket pid=10380 comm=syz-executor.5 09:50:26 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1894.697455] SELinux: unknown mount option [ 1894.719734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57619 sclass=netlink_route_socket pid=10380 comm=syz-executor.5 09:50:26 executing program 1: mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x1000, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) r2 = epoll_create(0x2000007) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x500, 0x2e0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpid() 09:50:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x4, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038adb3c223a5a492bcb845f0b239ed9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000070000000000000040000000197a0000ffffffffb5000000000000007324fd3ca03f0f00b28454142cf604413bdec08665d52c6a5a3b2c81123c7df3f36edec712689dd93cb0cc244ef026f792dd9971faba78d3b4dab1d34f651e8c9d31b9295ad1a0a3275d0d1a48f3132288a926522fbd38b7bedec87b83ecce1ef42523f42d5f4831b346718f3aed5a6c968577ca7b820d3009e10cd28902a007b67147f033aa72fc606ed0856289514dcabf1325e6f6679bbae86554d4d99a494844986f786cff002d73035596825090ac63304eaa8527c043425952b50be5312c196fe00d86a57fa66691e2be0c87908a81e6e8a8eeb7854516abe645d5e92c125bd38dddc1f667417c034b9e9a4fe54b90a874e28b26db21454b80b891128480cdae41ec669e7671771a44fc1904d6981188ba31736a4e7dd6205f3c0f50bb218e23cd687c38823d1d32e119b205ff4e29b56f689df7b08a23d002b828cc1f4577be683bcf7b2a1f5bab439d41085c9193dc19080b5a56ac009c18d6f7"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r5}, 0x78) r6 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @none}, &(0x7f0000000140)=0xe, 0x80800) bind$bt_l2cap(r6, &(0x7f0000000200)={0x1f, 0x6, @fixed={[], 0x10}, 0x2, 0x1}, 0xe) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x218280, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1894.883453] SELinux: unknown mount option 09:50:26 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1895.013150] kauditd_printk_skb: 24 callbacks suppressed [ 1895.013158] audit: type=1800 audit(8032384226.881:542): pid=10410 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=15895 res=0 [ 1895.025167] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:27 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) [ 1895.076027] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1895.077275] SELinux: unknown mount option 09:50:27 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1895.184224] SELinux: unknown mount option 09:50:27 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) [ 1895.217340] audit: type=1800 audit(8032384227.081:543): pid=10422 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15900 res=0 [ 1895.317551] SELinux: unknown mount option [ 1895.347883] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:27 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) 09:50:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) fcntl$notify(r5, 0x402, 0x2e) r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') setsockopt$inet6_group_source_req(r4, 0x29, 0x2f, &(0x7f0000000300)={0xfffffff8, {{0xa, 0x4e23, 0x2, @empty, 0x8}}, {{0xa, 0x4e20, 0x9, @mcast2, 0x6}}}, 0x108) sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="47cf90000c00990003000000000000000800010002000b3083e96740140000dd863945eafa64ff383239ecb4c4d250f763bf7172885d79d7"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:27 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:27 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) [ 1895.556129] audit: type=1800 audit(8032384227.421:544): pid=10435 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=15862 res=0 [ 1895.582393] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1895.610883] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1895.633890] SELinux: unknown mount option [ 1895.743228] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:27 executing program 1: mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x1000, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) r2 = epoll_create(0x2000007) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x500, 0x2e0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpid() 09:50:27 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:27 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) 09:50:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000001800000001090a9425b1c070700000079000000181a00006bea45ae8868103f61455407b6852be3b4876a53b3ece56cf78ad2ffac2eb4d7081f1849a9b8519d5623ec95799d4112ca0ead609fcc3f1efdf19f9f8745b5b8ee10138180f13309f27a00d558fde66c794bc6a5ac0d6e887b6b", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff14000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1895.920798] audit: type=1800 audit(8032384227.791:545): pid=10457 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15872 res=0 [ 1895.963451] SELinux: unknown mount option 09:50:27 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:27 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) [ 1896.061295] audit: type=1800 audit(8032384227.931:546): pid=10467 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=15862 res=0 [ 1896.064089] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1896.096894] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:28 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 1896.120488] SELinux: unknown mount option 09:50:28 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:28 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) [ 1896.237881] SELinux: unknown mount option [ 1896.311688] audit: type=1800 audit(8032384228.181:547): pid=10484 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15859 res=0 [ 1896.334959] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1896.398273] SELinux: unknown mount option 09:50:28 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) 09:50:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', ':-eth0+losystem!}\\\x00'}, &(0x7f0000000200)='ip6_vti0\x00', 0x9, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000300)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd060604000000000000000021fc5032b17d060c4a4a20f7a70fbf88af1d6e1db48d2e95b00493710cfb9e86601ab55446036d304f682af13534e72b8a825dea7f92b94c576cd9e84aa32c8c3a146d3c3a97b55d73759441430e85c62e446635dcd737e7aab0c40fd793033e907823b283b50fb9a9dc9a9dbca54e4717582d3c71dc719fa0d26fe7df07b04046efc459358a493d6bae68a606b66f18afc0b201b03525c049e4376249e37c3c39d10156c5f2e5dc95e56ae1ab2fd2346e75312db46204a6d5ab9a9b3e9bcb5be716e22e9f4ffbc0e226811a018e908ccfcfd38260e33c63899ee9a44dbb", 0x117}], 0x1) 09:50:28 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1896.537706] SELinux: unknown mount option [ 1896.579366] audit: type=1800 audit(8032384228.441:548): pid=10498 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=15832 res=0 [ 1896.617433] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1896.660752] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:29 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000800)="20f8d234517f2672415e6646378efdfb502c4ed76646d64cbaefae1f8cf524916fb50a0cf54d4556518b69797e5da68d4ce3808126eaf7fc29462018def0218df9e09659f3cdb46b87b62a6bde4efd9c042790f0bc7dd0fe6941d1ffd36f212084676e", 0x63, 0x40, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair(0x25, 0x3, 0x1, &(0x7f0000000400)) 09:50:29 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:29 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1897.183919] SELinux: unknown mount option 09:50:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1897.213766] SELinux: unknown mount option [ 1897.221830] audit: type=1800 audit(8032384229.091:549): pid=10518 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16314 res=0 [ 1897.293563] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1897.330068] audit: type=1800 audit(8032384229.141:550): pid=10520 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16305 res=0 [ 1897.363712] SELinux: unknown mount option 09:50:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000480)={0x9, 0x53, 0x1, 'queue1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\b', @ANYRES32=0x0], 0x9, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e3f66696c65302c6c6f7765726469723d6156995ee886fb74776f726b649dbf3d2e2f66696c6531"]) write$P9_RWALK(r0, &(0x7f0000000000)={0x3d, 0x6f, 0x2, {0x4, [{0x80, 0x0, 0x2}, {0x4, 0x3, 0x7}, {0x40, 0x4, 0x2}, {0x20, 0x0, 0x7}]}}, 0x3d) socket(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000180)='./file1\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 09:50:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:29 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1897.680279] overlayfs: missing 'workdir' 09:50:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:29 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1897.713902] audit: type=1800 audit(8032384229.581:551): pid=10545 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16307 res=0 [ 1897.783221] overlayfs: missing 'workdir' 09:50:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1897.892573] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1897.942180] SELinux: unknown mount option 09:50:29 executing program 1: r0 = socket$inet6(0x10, 0x8, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c0000003000010000000000000000004fac6baa9a40f4802ab80000000038000100340001000b01591afc34fc9f854b5ca10800010062700000"], 0x4c}}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e1d, @multicast1}}) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007f5f14fe01b2a4a290930206040200001301020b141239000900350026060100000019000b40060c1101020022dc1338d54404139b84136ef75afb83de4411000500", 0x48}, {&(0x7f0000000080)="73035000d612110000fffda888", 0xd}], 0x2}, 0x0) [ 1898.079656] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. 09:50:30 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1898.123284] tc_ctl_action: received NO action attribs 09:50:30 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1898.150120] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1898.195490] tc_ctl_action: received NO action attribs 09:50:30 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1898.507383] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:30 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x3ff}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) accept4$unix(r2, 0x0, &(0x7f0000000340), 0x80000) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f0000000900)=""/4096) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40783, 0x0) io_submit(0x0, 0x0, &(0x7f00000006c0)) io_submit(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r3, 0x81e6c000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3}, {0x0, 0x0, 0x10000, 0xfffffffffffffffe}, 0x1, 0x0, 0x80000000000001}, {{@in=@broadcast, 0x4d5, 0x3c}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x900000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) 09:50:30 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1898.780114] SELinux: unknown mount option 09:50:30 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1898.838526] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:31 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:31 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:31 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1899.272969] SELinux: unknown mount option 09:50:31 executing program 1: socket$inet6(0xa, 0x0, 0x0) setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde2788"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x40, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4040000) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x20) dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x200, 0x13ce1447, 0x1, 0x4, 0x24, 0x1ff, 0x7, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x3, 0x0, 0x6, 0x2, 0x200}}, &(0x7f0000000040)=0xb0) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000800)}], 0x1) ioctl$KDDISABIO(r1, 0x4b37) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000140)={0x98, 0x0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "83db8d786a"}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_SEQ={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x18, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa, 0x6, @random="ba0b7f3ccfcf"}, @NL80211_ATTR_KEY_SEQ={0x14, 0xa, "606240f0e86d81cd66775bb07af3bdcd"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "fca8d01f6f"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "3931921c37"}]}, 0x98}, 0x1, 0x0, 0x0, 0x240008c0}, 0x8800) [ 1899.302465] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1899.444624] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10636 comm=syz-executor.1 [ 1899.488326] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1899.510723] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:31 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:31 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1899.630137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10641 comm=syz-executor.1 [ 1899.673970] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1a55a97f6a241538d52667f9ffeef7028600ff7fff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000080)={0x2776, 0x19, [{0x7}, {0x3}, {0x1}, {0x8}, {0x3, 0x1}, {0xb, 0x1}, {0x9}, {0x3}, {0xb}, {0x1}, {0x3}, {0x6, 0x1}, {0xc}, {0x7}, {0x6, 0x1}, {0x8}, {0x0, 0x1}, {0x0, 0x1}, {0x9, 0x1}, {0xf, 0x1}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {0x6}, {0xa, 0x1}]}) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00), 0x60, 0x400300) 09:50:31 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:31 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1899.918650] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:31 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:31 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:31 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1900.122871] kauditd_printk_skb: 10 callbacks suppressed [ 1900.122879] audit: type=1800 audit(8032384231.991:562): pid=10672 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16311 res=0 09:50:32 executing program 3: mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1900.271246] audit: type=1800 audit(8032384232.061:563): pid=10677 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16309 res=0 09:50:32 executing program 3: mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:32 executing program 3: mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:32 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1900.501795] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x1, 0x0, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24eb04000000939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000040000200197a0000ff1400ff950080000000dfff"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180005", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r3}, 0x78) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000900)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRES64=r4], 0x3}, 0x1, 0x0, 0x0, 0x8091}, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000940)={0x27c, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xbc, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x20e30884}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7343}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341754bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x621fc271}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x555eab91}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f92adf0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x475fd550}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8eab}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x704b46c5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xace7}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x27cfface}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2523}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b9de01f}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3931}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x12be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4bd762f1}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd55}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52cb691}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x25a5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSCATLST={0xac, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x577d7d04}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8eeb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x12b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4f2f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xce83}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9f91}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ad50044}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x387}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5da6f1cc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b2e9606}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12c60152}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x206d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52d86f5b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8ab5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b512a85}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ba52025}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb0f8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69642f47}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5afc51e9}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xd8, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x30}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x641ea8ff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4feee97f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb7}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5e168240}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x39f8e67a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d81377f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7cdcc94d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31818a1}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc3}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdbcc0f1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d90903c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6e7495bf}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50420879}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x780edde9}]}]}]}, 0x27c}, 0x1, 0x0, 0x0, 0x40c1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x100000000000023d) 09:50:32 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1900.604007] audit: type=1800 audit(8032384232.471:564): pid=10698 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16336 res=0 09:50:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1a55a97f6a241538d52667f9ffeef7028600ff7fff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000080)={0x2776, 0x19, [{0x7}, {0x3}, {0x1}, {0x8}, {0x3, 0x1}, {0xb, 0x1}, {0x9}, {0x3}, {0xb}, {0x1}, {0x3}, {0x6, 0x1}, {0xc}, {0x7}, {0x6, 0x1}, {0x8}, {0x0, 0x1}, {0x0, 0x1}, {0x9, 0x1}, {0xf, 0x1}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {0x6}, {0xa, 0x1}]}) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00), 0x60, 0x400300) 09:50:32 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="000200000000000000000008000100020b81000000000000000000000000000000004a2928bd93b0b60b53ab5954ddbd72f56a11b920e2678afcfee33291f1b284853ebacbebf5d10807f9a1c04d48703014a44dfb72fc1d7c8f622600087e90da70a500598332d018041b6f45b3d409e9899342aaf3a54e2e42f4a8865f74ad816016c32a13e93cd7a0d857e555a84d25cec3f14587b1e68f87d26e39dc968e42a3ba88a3a9a1f4b40074209178f4a60da5ff1ccbd83d04df2b9a8b4e54c082e7b745c3b42ba2a9b8b1267be264e0a202b7133f7360f99e3aff20e6c3"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1900.785791] SELinux: unknown mount option 09:50:32 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1900.853646] audit: type=1800 audit(8032384232.721:565): pid=10714 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15985 res=0 [ 1900.923883] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1900.943003] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1900.970476] audit: type=1800 audit(8032384232.791:566): pid=10720 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16337 res=0 09:50:32 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:32 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000340)="054a3bb5e3382ba0f4bd92cebb4cd68334656099dff380034dfdb2341d1d38319c", 0x0, 0x0, 0x10024, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 09:50:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$sock_ifreq(r2, 0x8970, &(0x7f0000000040)={'veth1_virt_wifi\x00', @ifru_mtu=0x2}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0xb3) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="0000000400000700cc22822f", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r3}, 0x78) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000140)=0x1, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000008000000200000000c007f0003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1901.150542] audit: type=1800 audit(8032384233.011:567): pid=10732 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16007 res=0 09:50:33 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1901.216373] sd 0:0:1:0: [sg0] tag#1002 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1901.225406] sd 0:0:1:0: [sg0] tag#1002 CDB: Read Block Limits [ 1901.231619] sd 0:0:1:0: [sg0] tag#1002 CDB[00]: 05 4a 3b b5 e3 38 2b a0 f4 bd 92 ce bb 4c d6 83 [ 1901.240566] sd 0:0:1:0: [sg0] tag#1002 CDB[10]: 34 65 60 99 df f3 80 03 4d fd b2 34 1d 1d 38 31 [ 1901.249477] sd 0:0:1:0: [sg0] tag#1002 CDB[20]: 9c 09:50:33 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1901.304916] audit: type=1800 audit(8032384233.171:568): pid=10744 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16350 res=0 [ 1901.329264] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1901.343681] SELinux: unknown mount option [ 1901.345277] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:33 executing program 1: perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x2e) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x288, 0xe8, 0xe8, 0xe8, 0x0, 0xe8, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@ip={@loopback, @rand_addr, 0x0, 0x0, 'vlan0\x00', 'syz_tun\x00'}, 0x0, 0xb8, 0xe8, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0xe800000e, 0x6000002}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@empty, @multicast1, 0x0, 0x0, 'vlan1\x00', 'vlan0\x00'}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e8) setsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000000440)=0x400, 0x4) r2 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000540)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e09008ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b7d489f5731fe932a524e202ad84322a87972844ea13c0766c52c97a24ebd362d46a939b00000000000000"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xb, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32=r3, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000000300)=0x7) sendmsg$IPCTNL_MSG_CT_GET_DYING(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x7, 0x0, 0x1}, ["", "", ""]}, 0x14}}, 0x800) [ 1901.442462] audit: type=1800 audit(8032384233.311:569): pid=10752 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16311 res=0 09:50:33 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1901.533853] audit: type=1804 audit(8032384233.331:570): pid=10752 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir259683417/syzkaller.SueMNH/1976/file0" dev="sda1" ino=16311 res=1 09:50:33 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1901.673441] audit: type=1800 audit(8032384233.521:571): pid=10760 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16329 res=0 09:50:33 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:33 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xfffffe7d, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678c06ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) r6 = openat$cgroup_ro(r5, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f0000000040)="f22666f30f466661ba2100b004ee0f01c2670f01c5b83d008ed83e0fdddc0f32f080a12b1300af0f01c4", 0x2a}], 0x1, 0x5, &(0x7f0000000200)=[@dstype0={0x6, 0x1}, @vmwrite={0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3ff}], 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r7, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r8, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1902.026970] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:33 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:34 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000080)={0x9, 0x200, 0x0, 'queue0\x00', 0x8}) 09:50:34 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:34 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000080)={0x9, 0x200, 0x0, 'queue0\x00', 0x8}) [ 1902.184943] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x3, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="000000000000000085000018dd469c248807dd6676f1ef005a000000181f0000778d60307aa5c9fc188d4e2f19e68780266c2ff883cc769eb580bfaaff9c836bd84a7f426d4fbfabb7837582e278a03f57aaeb8b845488b1c6ed00933632323f848d220c3f6f7f844130a257ce28f2661e4fe2b7a444b01ee8aea3c7824fc29563bc99ac9e2eb96dcccfa6fb613ad155a7b6376e556bd1db6ff8baf16c418beadcb3d2e31d", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r2, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r3, r4}, 0x78) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f0000000000)="cc157991d8ee02f3d1b1cc5cf64f0f12c68e26de3c89d7a0752c1bcd2bf0f0b74e4df72025b194dd9aae4f4981ab4085532da46d99c594576d8e4acdd948fe4c161a9b4c1a80aa3a53adb02382c894c1f104dd707684a67c037020db8dfa946b0bffb90766e4f5c8be6ebf8556cae6f90223b1ab66ab1164752138", 0x7b, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r2, 0xc00464be, &(0x7f0000000140)={r5}) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r7 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xc, r7, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r7, 0x1) 09:50:34 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r3, r4}, 0x78) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:34 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000080)={0x9, 0x200, 0x0, 'queue0\x00', 0x8}) [ 1902.379631] SELinux: unknown mount option 09:50:34 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:34 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000080)={0x9, 0x200, 0x0, 'queue0\x00', 0x8}) [ 1902.421917] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:34 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1902.509119] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1902.562624] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1902.572540] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1902.678773] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1902.784925] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:34 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, 0x0, &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:34 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffffa6, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="708568fac09f527aeea698ee363ddc77ea99a7dbb04e1985567d72d89a42a19e6918ed28084bac98b850255d498db59002253e4aaee7158ea81d028e6dcbcad1b03a59a09c4171f53b4255c7cd4b3a0565d63ccee12f9063b21c0a7b9805b7a23c3af683800e7be666ffaa32f29b0777f0765c5c2d297d54c30f95cd7e14f5afe2ca92d51a7ac115047cee62c3d653f874fa73fd6629044d282104ffebf0fa40db4836989966eb96c2f24e7f23f5f8e1debb48476f8594560a99297a0ffdd8714a1b", @ANYRES16=r6, @ANYRES16=r3], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) pread64(r6, &(0x7f0000000400)=""/249, 0xf9, 0x5) 09:50:34 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:34 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) fadvise64(r2, 0x3, 0x6, 0x3) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:34 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, 0x0, &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1902.967397] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 1902.969177] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:34 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x406, r2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1903.013284] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:34 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1903.055907] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000079374000000000040000000197a0000ffffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r6}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r6, r7}, 0x78) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000000)=0x9, 0x4) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, 0x0, &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1903.121844] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x406, r2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0), 0x0) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x406, r2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:35 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1903.279867] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1903.375401] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:35 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket(0x0, 0x800000003, 0x400) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x7, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r3, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000000)) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:35 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') write$FUSE_WRITE(r4, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x3, {0x7fffffff}}, 0x18) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00021900ae522a80232b19961b9b51d8000000000000200000000c00000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1903.684438] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:35 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1903.748763] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) prctl$PR_CAPBSET_READ(0x17, 0x23) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') getsockopt$inet6_dccp_buf(r0, 0x21, 0x3, &(0x7f0000000200)=""/140, &(0x7f0000000040)=0x8c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'lo\x00'}) r2 = socket(0x11, 0x800000003, 0x400) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1903.862650] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:35 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$NFT_MSG_GETFLOWTABLE(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x14, 0x17, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x2}}, 0x14}}, 0x20004000) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r7}, 0x78) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x101800) sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r6, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4040010) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r5, 0xc01864ba, &(0x7f0000000000)={0x0, 0xff, 0x40, 0xfbfbfbfb}) [ 1904.022166] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:35 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1904.099051] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f00000002c0)=""/217, 0xd9}, {&(0x7f00000003c0)=""/109, 0x6d}, {&(0x7f0000000440)=""/176, 0xb0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/243, 0xf3}], 0x7, &(0x7f0000001700)=""/4096, 0x1000}, 0x1) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400000, 0x0) 09:50:36 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1904.145477] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1904.208888] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:36 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1904.262883] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1904.293473] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:36 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1904.350641] minix_free_inode: bit 1 already cleared 09:50:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000880)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x34, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x64}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4080}, 0x24008000) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000680)=0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000014c340000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MESH_CONFIG(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x800}, 0xc1) 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:36 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, 0x0, 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1904.506693] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1904.511619] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1904.576415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11016 comm=syz-executor.4 09:50:36 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:36 executing program 1: r0 = syz_open_dev$midi(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:36 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, 0x0, 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='cont']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1904.680644] minix_free_inode: bit 1 already cleared [ 1904.682688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11016 comm=syz-executor.4 09:50:36 executing program 1: r0 = syz_open_dev$midi(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='cont']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:36 executing program 1: r0 = syz_open_dev$midi(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1904.837368] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:36 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, 0x0, 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='cont']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:36 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:36 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1905.002595] minix_free_inode: bit 1 already cleared 09:50:36 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='contex']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:36 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1905.146824] kauditd_printk_skb: 27 callbacks suppressed [ 1905.146832] audit: type=1800 audit(8032384237.011:599): pid=11070 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16382 res=0 [ 1905.161043] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000080000000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r5 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="000400003fad7f1fda5804d123513e87592fb6ab4a5a5918a4a3b9bee7e11b4bf10e78a048cd7c3449edba0b8c2cf74074cc89f9ce7ee883", @ANYRESOCT, @ANYBLOB="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", @ANYRES64, @ANYRESOCT, @ANYRES32, @ANYRES16=0x0, @ANYRESHEX=r4, @ANYRES32=r0], 0x24}, 0x1, 0x0, 0x0, 0xc890}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r5, 0x1, 0x70bd27, 0x25dfdbfd}, 0x14}}, 0x80) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2002004}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000425bd7000ffdbdf250a0000000a000900aaaaaaaaaabb9e00080034000000000005002f000100000008003a008100000005003500ec00000005002e000000000008003900060000000800320003000000"], 0x58}, 0x1, 0x0, 0x0, 0x84}, 0x40004) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c00000030000100000000000000000000003800010034000100080001006270660024000280060003000000000018000200000000000081000000000000000000000000000004000600"], 0x4c}}, 0x0) ioctl$FS_IOC_GETFSLABEL(r6, 0x81009431, &(0x7f0000000200)) [ 1905.224269] audit: type=1804 audit(8032384237.091:600): pid=11076 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir270415434/syzkaller.0FkD5J/1754/file0" dev="sda1" ino=16352 res=1 09:50:37 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='contex']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:37 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:37 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:37 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='contex']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1905.340364] minix_free_inode: bit 1 already cleared [ 1905.347316] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1905.370226] audit: type=1800 audit(8032384237.231:601): pid=11086 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16377 res=0 09:50:37 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:37 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1905.491764] audit: type=1800 audit(8032384237.361:602): pid=11098 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16364 res=0 [ 1905.526831] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. 09:50:37 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1905.550869] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1905.563516] tc_ctl_action: received NO action attribs 09:50:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:37 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1905.600658] audit: type=1800 audit(8032384237.411:603): pid=11104 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16393 res=0 [ 1905.700422] minix_free_inode: bit 1 already cleared [ 1905.708014] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1905.746143] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1905.762849] tc_ctl_action: received NO action attribs [ 1905.806319] audit: type=1800 audit(8032384237.671:604): pid=11123 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16377 res=0 09:50:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:37 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:37 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18ddffff060000000000000040000000197a0000ffffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r2, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r3, r4}, 0x78) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000000)=r2) r5 = socket(0x11, 0x800000003, 0x400) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1905.855344] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:37 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1905.948924] audit: type=1800 audit(8032384237.811:605): pid=11132 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16370 res=0 09:50:37 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) [ 1906.011078] minix_free_inode: bit 1 already cleared [ 1906.065709] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) [ 1906.109245] SELinux: unknown mount option 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:38 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1906.190790] audit: type=1800 audit(8032384238.061:606): pid=11150 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16396 res=0 [ 1906.204282] SELinux: unknown mount option 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x80000000, 0x84000) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x3fa, 0x200, 0x70bd26, 0x25dfdbfc, {0x1, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0xc0d1}, 0x4000001) 09:50:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) [ 1906.274707] audit: type=1800 audit(8032384238.141:607): pid=11162 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16364 res=0 [ 1906.297879] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:38 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1906.372036] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1906.401194] SELinux: unknown mount option [ 1906.411899] minix_free_inode: bit 1 already cleared 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) [ 1906.436552] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:38 executing program 4: syz_open_dev$ttys(0xc, 0x2, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) iopl(0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:38 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) [ 1906.562996] SELinux: unknown mount option [ 1906.573650] audit: type=1800 audit(8032384238.441:608): pid=11185 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16399 res=0 [ 1906.602926] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1906.663034] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:38 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) [ 1906.728478] SELinux: unknown mount option [ 1906.771323] minix_free_inode: bit 1 already cleared 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:38 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) [ 1906.949464] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:38 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) [ 1907.031668] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1907.066428] SELinux: unknown mount option 09:50:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1907.101888] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1907.120663] minix_free_inode: bit 1 already cleared 09:50:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000000)=0x400, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) r3 = dup(r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000200)) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) recvfrom(r5, &(0x7f0000000040)=""/60, 0x3c, 0x1, &(0x7f0000000100)=@generic={0x10, "7bd779bdea2605ffed4f4b94151312d0c57f0397aee63893018450d6f9059efb2ff2b64debd46f35af36235bcd44cb7a189f6754fd492c7ee4aa6158f270372a6de1f38aabbe48aaebee3184e9c68dd314cf873334e1c669207f9c29c822e93a6d94c86dd20498c7facc2a7d330297652d5c56d36f75c3e64a76774dcc35"}, 0x80) 09:50:39 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:39 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:39 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1907.284994] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:39 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) [ 1907.343074] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:39 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1907.412493] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2800ffec1cbf704081c7d7eb219ddfdd1a7cb81659b126b4acc5cba3b9dc0748caad4649d17c43d8279d39ee3b3a696d0d9be68bbcaac7127b573b39490bb113ea0439396e3b1d96e84f956b2b07a3829ae1d18297a428d9294beb894adcc888e5220b6f6db3e76c04960ec6e030673a97e734c52bb5599bc52bee312cd1ddcafe250509f5a9e379591f841d32094acf042085f902dcd73c6bda0dfba7cf0d35ecf24ed928f9ff7cf48b0d6dd785275d", @ANYRES16=r5, @ANYBLOB="000200000c0099000300000000000000080001000200"/34], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r9}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x94, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x4}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) 09:50:39 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) [ 1907.467093] SELinux: unknown mount option [ 1907.470303] minix_free_inode: bit 1 already cleared 09:50:39 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x20) r3 = semget$private(0x0, 0x20000000102, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0xfeff}], 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x3, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3f}}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x2, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001400)={0x3, 0xf, 0xeab, 0x200}, 0x10}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x3, 0x1, 0x2}, 0x10, 0xffffffffffffffff, r4}, 0x78) r5 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x595001, 0xdc) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f00000012c0)={@x25={0x9, @null=' \x00'}, {&(0x7f0000001200)=""/145, 0x91}, &(0x7f0000000140), 0x5}, 0xa0) semop(r3, &(0x7f0000000380)=[{}, {0x4, 0xffff}], 0x2) semop(r3, &(0x7f0000000080)=[{0x4, 0x9}], 0x1) semctl$GETPID(r3, 0x2, 0xb, &(0x7f0000000200)=""/4096) 09:50:39 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) [ 1907.571229] SELinux: unknown mount option [ 1907.613304] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1907.635730] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:39 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:39 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:39 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) [ 1907.664401] lo: Invalid MTU -387920854 requested, hw min 0 [ 1907.682643] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1907.704880] SELinux: unknown mount option 09:50:39 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1907.739073] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0ff139"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r6}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r6, r7}, 0x78) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:39 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1907.800537] minix_free_inode: bit 1 already cleared [ 1907.884741] SELinux: unknown mount option 09:50:39 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) 09:50:39 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1907.948282] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1907.951481] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:39 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:39 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1908.047377] SELinux: unknown mount option [ 1908.105059] minix_free_inode: bit 1 already cleared [ 1908.246341] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1908.400721] minix_free_inode: bit 1 already cleared [ 1908.424587] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000140)) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) fsetxattr$security_ima(r3, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "6c405084cf26b8de248ce0c6a6d9d315"}, 0x11, 0x1) 09:50:40 executing program 1: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) 09:50:40 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:40 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) [ 1908.589825] SELinux: unknown mount option 09:50:40 executing program 1: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1908.652443] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1908.676766] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1908.695997] SELinux: unknown mount option 09:50:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a3", 0x6f, 0x1}], 0x100488, 0x0) [ 1908.762568] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:40 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:40 executing program 1: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r2, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r3, r4}, 0x78) accept$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a3", 0x6f, 0x1}], 0x100488, 0x0) [ 1908.867193] SELinux: unknown mount option [ 1908.880465] minix_free_inode: bit 1 already cleared 09:50:40 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:40 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, 0x0) 09:50:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a3", 0x6f, 0x1}], 0x100488, 0x0) [ 1908.985023] SELinux: unknown mount option [ 1909.022842] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:41 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, 0x0) 09:50:41 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1909.105720] SELinux: unknown mount option [ 1909.111965] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:41 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda4", 0x82, 0x1}], 0x100488, 0x0) 09:50:41 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, 0x0) [ 1909.181191] minix_free_inode: bit 1 already cleared 09:50:41 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda4", 0x82, 0x1}], 0x100488, 0x0) [ 1909.232768] SELinux: unknown mount option 09:50:41 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1909.298329] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:41 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x80000, 0x4}) [ 1909.349402] SELinux: unknown mount option 09:50:41 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda4", 0x82, 0x1}], 0x100488, 0x0) 09:50:41 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1909.431686] minix_free_inode: bit 1 already cleared 09:50:41 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x80000, 0x4}) 09:50:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae4b023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) ioctl$SIOCRSGCAUSE(r5, 0x89e0, &(0x7f0000000040)) r6 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, r6, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x1, 0xff, 0x8, 0x0, 0x7ffd, 0x4308, 0xd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x100000000000de, 0x4}, 0x1088, 0xfffffffffffffffe, 0x4, 0x1, 0x5, 0x7fffffff, 0x5}, r6, 0x4, 0xffffffffffffffff, 0x7) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000540)={[], 0x3, 0x20, 0xfffffffa, 0x6, 0x1, r6}) [ 1909.487045] SELinux: unknown mount option 09:50:41 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) [ 1909.545867] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1909.572018] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:41 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:41 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x80000, 0x4}) [ 1909.655858] SELinux: unknown mount option 09:50:41 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:41 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) [ 1909.720732] minix_free_inode: bit 1 already cleared 09:50:41 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x0, 0x4}) [ 1909.833087] SELinux: unknown mount option [ 1909.851780] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:41 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) 09:50:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db02303000000000000002444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39978d6b6d047322935bbfac26ff913a3298ae3ebb803a309b2a3e822c9e633f9cbfd6923fcec43caf0f9029e3af109268a1766f263b78654e40310a4da01c53e31f4df12d77dc563ddf2713ea42c7cddb99e6bd5ec65896ed4ac0c68fc606a6ec8604cb9d5586047374cf52110167b62c10ad91412f6fe3ed5ad8a3464025"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r5}, 0x78) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r3, &(0x7f0000000540)={0xe0002005}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="0007000000000000000000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r6}, 0x78) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)) 09:50:41 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x0, 0x4}) 09:50:41 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, 0x0, 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:41 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb5874427", 0x90, 0x1}], 0x100488, 0x0) 09:50:41 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1909.980741] minix_free_inode: bit 1 already cleared [ 1909.987525] SELinux: unknown mount option 09:50:42 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x0, 0x4}) [ 1910.082032] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1910.098634] SELinux: unknown mount option [ 1910.100976] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:42 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb5874427", 0x90, 0x1}], 0x100488, 0x0) 09:50:42 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, 0x0, 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:42 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000}) 09:50:42 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1910.298024] SELinux: unknown mount option [ 1910.300844] minix_free_inode: bit 1 already cleared 09:50:42 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb5874427", 0x90, 0x1}], 0x100488, 0x0) 09:50:42 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000}) 09:50:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x16, &(0x7f0000000040)=0x5, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r3, 0x100, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x7, 0x7, 0x60cd}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20004800) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)="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", 0x107}], 0x1) [ 1910.428328] kauditd_printk_skb: 21 callbacks suppressed [ 1910.428337] audit: type=1800 audit(8032384242.291:630): pid=11516 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16415 res=0 [ 1910.467017] SELinux: unknown mount option [ 1910.495922] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1910.526299] audit: type=1800 audit(8032384242.341:631): pid=11519 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16419 res=0 09:50:42 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000}) 09:50:42 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x1}], 0x100488, 0x0) 09:50:42 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, 0x0, 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r0, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r1, r2}, 0x78) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'lo\x00'}) r4 = socket(0x11, 0x800000003, 0x400) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1910.670600] minix_free_inode: bit 1 already cleared [ 1910.705088] SELinux: unknown mount option 09:50:42 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x1}], 0x100488, 0x0) 09:50:42 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1910.821826] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1910.828238] audit: type=1800 audit(8032384242.691:632): pid=11548 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16413 res=0 [ 1910.843261] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:42 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:42 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x1}], 0x100488, 0x0) 09:50:42 executing program 1 (fault-call:4 fault-nth:0): r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1910.886692] SELinux: unknown mount option [ 1910.977655] audit: type=1800 audit(8032384242.841:633): pid=11562 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16415 res=0 [ 1910.999043] SELinux: unknown mount option [ 1911.017044] FAULT_INJECTION: forcing a failure. 09:50:42 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1911.017044] name failslab, interval 1, probability 0, space 0, times 0 [ 1911.044930] CPU: 0 PID: 11565 Comm: syz-executor.1 Not tainted 4.14.180-syzkaller #0 [ 1911.052854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.062208] Call Trace: [ 1911.064805] dump_stack+0x13e/0x194 [ 1911.068448] should_fail.cold+0x10a/0x14b [ 1911.072609] should_failslab+0xd6/0x130 [ 1911.076590] __kmalloc+0x2e9/0x7c0 [ 1911.080148] ? snd_rawmidi_input_params+0xfd/0x300 [ 1911.085086] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1911.090109] ? _raw_spin_unlock_irqrestore+0xa0/0xe0 [ 1911.095216] snd_rawmidi_input_params+0xfd/0x300 [ 1911.100020] snd_rawmidi_ioctl+0x455/0x620 [ 1911.104258] ? snd_rawmidi_output_params+0x440/0x440 [ 1911.109384] ? selinux_file_ioctl+0x3f7/0x560 [ 1911.113879] ? snd_rawmidi_output_params+0x440/0x440 [ 1911.118987] do_vfs_ioctl+0x75a/0xfe0 [ 1911.122793] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1911.127554] ? ioctl_preallocate+0x1a0/0x1a0 [ 1911.131985] ? security_file_ioctl+0x76/0xb0 [ 1911.136395] ? security_file_ioctl+0x83/0xb0 [ 1911.140807] SyS_ioctl+0x7f/0xb0 [ 1911.144173] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1911.148150] do_syscall_64+0x1d5/0x640 [ 1911.152225] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1911.157434] RIP: 0033:0x45ca29 [ 1911.160618] RSP: 002b:00007f95e010fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1911.168338] RAX: ffffffffffffffda RBX: 00000000004ed180 RCX: 000000000045ca29 09:50:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x34, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = syz_open_dev$media(&(0x7f0000000540)='/dev/media#\x00', 0xb68, 0x40) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r6, 0x4018620d, &(0x7f0000000580)={0x73622a85, 0x100, 0x1}) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) ioctl$USBDEVFS_GETDRIVER(r5, 0x41045508, &(0x7f0000000200)={0x10000, "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"}) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:42 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c8", 0x93, 0x1}], 0x100488, 0x0) [ 1911.175609] RDX: 0000000020000040 RSI: 00000000c0305710 RDI: 0000000000000003 [ 1911.182882] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1911.190153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1911.197421] R13: 000000000000050d R14: 00000000004d4250 R15: 00007f95e01106d4 [ 1911.220528] minix_free_inode: bit 1 already cleared [ 1911.302788] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1911.351343] audit: type=1800 audit(8032384243.221:634): pid=11580 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16431 res=0 [ 1911.364737] SELinux: unknown mount option [ 1911.387874] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:43 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c8", 0x93, 0x1}], 0x100488, 0x0) 09:50:43 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1911.443969] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:43 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregs(0xd, r3, 0x3, &(0x7f0000000200)="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") 09:50:43 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c8", 0x93, 0x1}], 0x100488, 0x0) [ 1911.522341] audit: type=1800 audit(8032384243.391:635): pid=11593 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16418 res=0 [ 1911.546282] SELinux: unknown mount option [ 1911.551358] minix_free_inode: bit 1 already cleared [ 1911.662337] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1911.675165] SELinux: unknown mount option 09:50:43 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) [ 1911.698558] audit: type=1800 audit(8032384243.561:636): pid=11608 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16431 res=0 [ 1911.739857] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:43 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1911.772977] SELinux: unknown mount option [ 1911.782181] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:43 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) [ 1911.850652] minix_free_inode: bit 1 already cleared [ 1911.909656] audit: type=1800 audit(8032384243.771:637): pid=11622 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16406 res=0 [ 1911.982846] audit: type=1800 audit(8032384243.801:638): pid=11624 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16418 res=0 09:50:43 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) 09:50:43 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1912.113843] SELinux: unknown mount option 09:50:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r0}, 0x78) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000540)={0x6, {0x6, 0x80, 0x7ff, 0x28}}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'lo\x00'}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00ddffffb0f3000495e4ffff0008000017230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r2, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r3, r4}, 0x78) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) r5 = socket(0x11, 0x800000003, 0x400) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1912.135118] audit: type=1800 audit(8032384244.001:639): pid=11634 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16433 res=0 [ 1912.173599] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:44 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 09:50:44 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) 09:50:44 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x1}], 0x0, 0x0) [ 1912.292422] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1912.307107] SELinux: unknown mount option 09:50:44 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:44 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x1}], 0x0, 0x0) [ 1912.421449] SELinux: unknown mount option [ 1912.482094] minix_free_inode: bit 1 already cleared 09:50:44 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x1}], 0x0, 0x0) [ 1912.562395] SELinux: unknown mount option [ 1912.594042] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:44 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) [ 1912.675172] SELinux: unknown mount option 09:50:44 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADDIR(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="2a0000002902006d9e000004ffff00000100000020237d000000fd0c0000000000000707002e2f66696c65306c452f619b1475653d5cd6fe8d0e759826839f45942c61ce6d"], 0x2a) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000080)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000540)=0x10001, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r6, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ade44678b76ff6eb4d2db0ccd270efa2d1ec19db79071823d489f5731fe932a52444ea13c0766c52c97a24ebd362d4"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x10, 0x3ff, 0x7}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000700000000000000400000009500000000000000950000000000000004d1fcaacb9decda511f7247a03b0d7c3593261cb0bfb87bbe95ccbd3532126cd8f22d7356a2e6a6ad1cb1ab4e67ae220d8c05b828dacab989ac2a1d107061f3ea6e0c1e949017fa99db"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xc, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xf, 0x7, 0x200}, 0x10, r6}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r8, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYRESDEC=r7, @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r5, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r6, r8}, 0x78) ioctl$RTC_WIE_OFF(r8, 0x7010) [ 1912.900912] minix_free_inode: bit 1 already cleared 09:50:44 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:44 executing program 3 (fault-call:3 fault-nth:0): mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1913.021174] SELinux: unknown mount option [ 1913.037308] FAULT_INJECTION: forcing a failure. [ 1913.037308] name failslab, interval 1, probability 0, space 0, times 0 [ 1913.064532] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1913.093590] CPU: 0 PID: 11694 Comm: syz-executor.3 Not tainted 4.14.180-syzkaller #0 [ 1913.101494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1913.110873] Call Trace: [ 1913.113498] dump_stack+0x13e/0x194 [ 1913.117136] should_fail.cold+0x10a/0x14b [ 1913.121296] should_failslab+0xd6/0x130 [ 1913.125273] __kmalloc+0x2e9/0x7c0 [ 1913.128817] ? SyS_memfd_create+0xb9/0x3a0 [ 1913.133055] ? strnlen_user+0x130/0x1a0 [ 1913.137028] SyS_memfd_create+0xb9/0x3a0 [ 1913.141087] ? shmem_fcntl+0x120/0x120 [ 1913.145058] ? SyS_clock_settime+0x1a0/0x1a0 [ 1913.149475] ? do_syscall_64+0x4c/0x640 [ 1913.153449] ? shmem_fcntl+0x120/0x120 [ 1913.157338] do_syscall_64+0x1d5/0x640 [ 1913.161229] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1913.166412] RIP: 0033:0x45ca29 [ 1913.169594] RSP: 002b:00007fe89789ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1913.177305] RAX: ffffffffffffffda RBX: 00000000005088c0 RCX: 000000000045ca29 [ 1913.184572] RDX: 00000000200007d8 RSI: 0000000000000000 RDI: 00000000004c1b91 [ 1913.191836] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 1913.199100] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 [ 1913.206366] R13: 0000000000000bea R14: 00000000004ce2a4 R15: 00007fe89789f6d4 [ 1913.441415] minix_free_inode: bit 1 already cleared 09:50:45 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:45 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x7f, 0x1, 0x4, 0x20000, 0x0, {0x0, 0x2710}, {0x2, 0xe, 0x1, 0xff, 0x7f, 0x1, "46ce0758"}, 0x7, 0x3, @fd, 0xffffffff, 0x0, r0}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), r4, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r5}, 0x78) sendmsg$TCPDIAG_GETSOCK(r5, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c1300001200000229bd7000fddbdf250a6706014e204e2300000000ec010000040000000000008001040000010000800104000005000000", @ANYRES32=0x0, @ANYBLOB="0100008007000000cbf800000100010018000100cd135e4fc8e68da3df4e8375c0508530ae916b92b2000100d053a9d15b97049488a9d22013e74fe0750489106c2eb5e25dcddc1a083dd89c9c568a18ce693bd6d7644efd9aa080231db9ab9604aad1f446d58b421f3fc97f3a4c2eb0958f9d301cea63b741ceed7796765224f441143ac83790d537d0fbe7f782d5e5c16a71d47752812b91a6fea32dd1439560f1a5242b593f711b77a42baf251121883c39c0c452faa9f18585a7fa2caaf7a0b0c173da00c2b92b8705ddd7985b0560f95e08cf0b8c6bd62900004d000100a0d16a26414e80bb89729308b4b7b5951e4ea0040b1ffdc9298117f786459160cf78e5bfd0de058a25db5636266561be04a40689d29dac34c237bb172c972560fba2ca015d35d5107a00000056000100a3863305b6960c7c1cbfbc2879051cde0cec5caef800501dd2492463bdbfe9df27cd2d64599b0e162570f0a328ec2a8a461b77b25588df843dcc36e90f83a7c0ca5cb4c5584053f69e0dc330699c6a6c68cf0000041001008b544fdc6d8e66260cb21e6260ca0bfb2ed7f7d2c05121cb948742684a684fb26c4dce18e67e8f66b855b0c9dd5da32e820b050f40a134c0679c610ccb8f38fecd99032f9b58744abcbf7c78c057ece8c7be242c7d960505cc5f0609b5db2f598ebff3d0a1ef9aca18ba203bd8ca34346fb8102f2e977213fb3a48508bcac1956a2a2875d50c17d6f8878c6e9bfc147a540c46117e693db117f1ec1b97ba023d1ef6daa0b06bd8e65769ce5cf7357f0ddbd5fbd54cb5fd5607d5a994137c8dfc1a7b12f322c9c814c3c8409127ef3f26c8bd81e23470276f986da0543aa5006663492d12c190a683755be88a10a550c511e1ab846c8543f846fa0b4531eae8b190f5677100bd453bc800681218a2bebcc573a33052721777923a6701bf2ea625036baf936e16dc3999fec21840aeb64c4c0ccdf235a029256a6226a510b3e8e64dc2d5854a8ccfe456f73a9129b6f2ef409b867bc511ab993efed3b640f7e7c22098ba0c24006cebc636d1da80085c5beb35be97fd7333302b095f4466320aa64fe75c3bdf54a9949c37730815dec46b86f0b0d06f02b60e77a94800489bbecea6db1124e816c44312114ff4eba3476e14471dc28d0a57228729d4f59e45b53a974e680489046a93745576ae9f327a56269c920a7a685b29e43baeff6206f5c94ca313b7099ad1e6733c742926d75134299b05443f59b5067e1826e9e8467a6140612469e275d7e77e7a00c1dc3d6704704c1ee1761c9b522824ae611368bf9106e9d65cf03b513e44c09fc09dce45cc95f40ed88099a1225410b018a11f33f41983f5dd75dd61f4821f287fe663a986f310f23e21b4f838b4d987327ec5687e448f77f4092c38b74b5d6034804bf31699176b7a5d45cb0072099f1b43d0bac9a9ba4da4168cd9eb85dcd23ca20a618db255f79ddd14151131fd443f984ddc91048a1f4b29e44c73cdf32208573584868dca078fbbee1b91a3181a05cf1bfdd52e0817beb227d56fdca764acc0d37925f3a87d979bfc1865cdbda6017861c7e5814f116816913f53b070aa49fc76804ad593b59121474ce9d85f580ce429156f2b033cb6af173f0d6f4d751e1e675456363c36701ee0cbdebc280e133d6a39827f834041ab3f315f1a69b5d651528f874e87cc0bcc17aae9ace415da669d35a816c306d068261c167e3d9bc1bdf2e545d5c4086162b9d5a7ef8e65596ace15397c5a82f3fc67f0c0381dec9fd43c822df1e8c0c96620a3cbf2b35e20622771f78149abd991397f64fe3522e0c9fa1d07d676ac834540b2444dab82e2ef8af0af4f87da4129acf96b086b8f6df58b3d1c2d8a06205dd47d8b71a1aa63003ff8a51e47d62c8f27d9e2c774f39b0d2c77e80bed9f1531e55701783cebcbdfca7ac90d50e35deb4591b49d41c6bcdf3ccc4ed5311f816acd9fb6fdf971f3e5ba452625e6b79ea8e68a5efb285443af2b982ab648c6c9c10739c63644421463d4a1eca59f40c0748973403433d6ae46b7c1601e128dbaa90669159ac86917dc471bdb2b623fd6a69efe1e26200e3cb2b7d25f431c0745291e2d9b2fa5278308385325a6fa2eead739a05421ef4f4296d1d286859b3cf90f97b919e5e77eff0794ce8817c844b005b85fe88c9274fbefa7f407eb90212c72325cd474af4dc4fffcee368bcb542260a6343563762a68469911e4c042c5fbf622e5ae458f9d0d335d0982aca57e0f11958bc9e8d2d52aaef45592bd89c234725a274cec678f366bc8f520a25891b5a10bd1dcdd4b798dd640572c1e04edc0710156c2b1e1815e09bcced1d9f47c4866b7406daa1f02c9296941d3f02d76728cc3772d77152d245eac01c732ce0779f19676166d9bf003e7ddfa95942236dcbd8dee40fedb344f0f0d9c42af307aa44be9591a864511658e5c91f16fe0f4601df288d67d7e2df366c826fd637fd2b75d692b9de8a4c345ea5d8e8961dd6a4dcaa3185d7c30038dacd0545209c6dce73840f7d4829abecf52961b1d10e3d311c7afa20bcda16dda9924500acaf26089528f49db110f700bb6e542c4fb932db6db364e24c3c9cf95365bd28e3f4235c262e6e31ecb312f724ab58bfb6a6c6fe530b5617e7c47f2385220ebd7db6863546ef1be26820f47593188d0cc974edcd7f6544f1f885f2e6918c6f0a6b3f946176d6b6d5f2d404f77e947d9fb5cdfd9d91ce342b20f54820308210f5f1ac75a059a66a63ea26bb03b51d5940cb4d2e3385f4897ef525967d0cd62a707e5788022214f418c82c497148bdc5c7174cfb2e471eba05613f738f720d482b7d7267f9c46a75183fed2c2dc1ffef2dd46294893be962f62e12bb8271a8c493328a29ddfd63de44c9053de49446d317264978186eda256919cecb29a176e7246804fb97ab0c6cdc82cdbde1f916b839326d2388aa7802b788039937943090be8be297e05f07b8a6f14120b666609e158297b3c445a1c00c80549313606183ea2c4af1d749e909eed10f043e1e04627d667fc94d686cbc633d5d0d347561fbe5b97eb713d7d2a89b395b3c7740229abb0e879f43c395219b2efcb4e82d5f3c986a0dbefeb6fa8ac2b84e47f31f75eb3cce9ddfbcc60c1b292a532a21b0347f53765468885443025753bcbe73d11248ec60bd238f2237711f36d0422a0d15aae3666f017189cb1584b7616c1616061a773e54e990b60bdd5c9982cf7208920c624ac4da3392a35ad9dfdd22ea0051421dd565f7e5b6cc57ee227c5a2ee57e1b0e0a3de3bcd7046bcdcd7ae5141f7a85fe12774b0d76c389c4b475ace44e7b869e613f98995f3d31d141d447e7ed6d2936dc5297649a809d907a018a0b837ba5beb1f0662748551f08263c41983cd22364e8697c1e523409c6b8f7ecadc063051f1c9c886e766d0a7d84346db892c98e4b9eec5a24c73cb4f4c7d6448fed0d4b8eaf31d3b57231d70e4e31e3d983760ef34f30fc01fa1d1262872761dd251e2358e344d316abe1ee834a2ec8bd3a4d3138d86421d7ed99350aed56934ff0401cb41bf52eaa65d90d63f34bd7c0ce8aa550a153fca34fcde63689ff819c9836fc1c23a3f53347106fc7834496848f61e2d7af790860282c124fff765a2fc02ac1b0755d7819faaae5101a6bfda2ecab45324af56c3acb8109dd0d410a5711579603708a610f77fbebc9b1e0936ed42da96af105c8c482c2335ff3fd66b990a1f06bc0f63094d868d56695a7e61e426682dbf82a08c4f17dce28d6e155e30f14068b69e401271abf109c8466d9d5c488ac477c301532d6791482811d6c01e923880a3e36dcb93c8fe3b645f88cbaf07b12de1662f62957423e6762e145444b17603b3e410835eb03fbe3719b658fd1979b99d8bc923b8358452bd047533e2f2622fab78f77f9aa96247e5619cde3629afb1b3bbb48f23f97742c50a823f5100b231f6e5052a3adca909e84d1f291027363caa9f360bb3f52499a2aad6646c8fec5593c18015ca33a8375fcbdea2b420907227da8ec9a517bca1bf06c95fab8878eab915c76e5f5e115b13e6957106d3bced4585a2b271b5558755c8152abf0e09ff42fcb496b67edac132d16e7670ad2cfd5d1b8ebe7612056f7e2ffc6cb9c6d649d19ebe6dfd96d4b9ba3bc05755d95021902a4f177ea9483d502315b18514b171d8704d97460085a5666c905496f025a546cd5ab6749ca105db7cff41026a629d4ce7c8a4e8e664a6493a47972266e7c4894ba5f5a79f4caa4eb5e4925e2e6a6a826611b18a88dc5d9504e0fe607ad71c1e711a43f366f9afc44aaa9bae0be19aa4d1f60bb3416a5b26e4481b77b2efe62405a624cc0b03d27c5e6af17bf25dc571f8d1a0c9d2de593b8f35a9093fa379dbd6defeef5e83560cc9ffdea6b5ecd2327ac4352735eefcd57c82d54856de82fff9dffc6b3ec279fb0c005ff576947e2784d8d62377b2cdbb9e305e20de3c83f6d382b61978a2d9b898746a791dc93453349d2e69246407163d092b376d19faf927616b250d34a48dcae1326ccf39872a373b46963c65e35c595903f45faa608134fd96c46a3684e53cd7295fb6f7e1b5a9d7a73c01f20a5f5adde4676b97221fec7418bbc4c9f1155f99788962cf9e63c95d16a199a815f1bc5340dae8f2e22e84b93e191cd1046e6cc4fe9198fb7a008b3cae0bf1a15d0f4d1559a26039c300d4348c7fd727e0893b398cccedb5a3ca358904d50bca3beb32b6680af4acfa513a1c8ad54e249b5db0c3179c6b6f4ef2d35579a852a568b8a9a736085667a08de609e82e9e78b40657bcd4d6fa87d46804241ad81448aac61a3610872cb23f1e5d908ccc4811547791039cee0d33d04576e84ceac1af02a4973a288b0990f10ee1fe424526c6230ddf9db4b4af57d310c096c1c93769488b233ce70528bd7f0ccceaacfbecc4baab71831911fe5eed5c35cbb4149e2c695654b348d78cb454fd43674dba4270703a5cc697ab3db469c1de5971ae8f7e832dd5b6ef52d9845fc8b2e1dcc0e9d7f838076dd9558c5acb537c1c003f9ec13770fec15aefb73e41485a41b04aadf77cd90f8e17c305fd85abc8781d72e47d711bd1d35bf2b4b23fee6f2a31a321b518f0cfc51596755f2e6162eca612b2abbaa03eaf249273888dbf0d1749dfa1016ab262445642e9f00c7184f2bc2998fa9f984f723486c5e0abda0e29f025dce6c408310cb103e4f22337f0fe5a5eaaa14de4ad3b0cdc91870fa62475d7aa6d18bbcca476e1de77dcc26bd216267834229ba08fb4e50a923257ccefbc01ff8bb164548c83315e99a7e404e5a30e24aeb97f59dbd0a4f74e8155c0dfece42cb778e501cabf2c66a1c007889a72d1721f4986ad4387fd04c538ad9023497f7fe2340b4e0f0722bf8b61af9704f8781825cc3351910a623900ecdbff5012e06a7623a77448282111e698f3ea1f017eb13db756d6b7f4f5835b281d721fe033e23cd693d0b54a5cbec15215084b86cbcb4b36a7d44410a0fe89578eb21aa105c2e4b71a26643c40bc8dee8818fbbb233b81fe11b8c8bbe7b77badf0e0a6107293507984dad1dc3f213c68abe16313fefbf017d1f7bf9917a6afdf435e537ad3a88346fffea8c5d7784bdf79e2fc9d1d2950d6d16574db7e37461769a975bb45c5f1e829f35c638bdf92669a5cf00a95154736777f8a9c0a5d10d8c54294716f56350331115c77beb12b1ec7cca92cd7a6dcba1d7c3bf34b36f793cfe887dcb8f7394256664bf83bad5b98486e26e413b7e82bc02f8af70d4b7c0b6d7c81b0f464dce078a5d5ab1c6097ed4911ca04277f97df79fc279100adc53b9637526dbcc022aef2b39d4e9f3337c4e9fccc918fc360bf046887a49c3642211bc8e92746b5a2446eae421d652c5854aa0acf1ae1a4841c2819e8bf2cf7fbcf36e259ac05d032fdd72146e07fecb40058b958c4825611c29556ae2dcef3d47b571b0b95b61fb10908a1bdd5308c05dd40a54afa8c86543de63dadcc574b01d89f86fa457dbe2bba8933a9ca1d68285289ee9b31e4debf9081786690ea50c03e41a985e03072fc0c3fa98c3ca0ef4f3410b540eed01af783e7de4c68544f383ac4eb4181d745be9786c1f31cd1c212b9ffa2ffad55ec19d4e3e61b3003cee0b264382b27e39f684d7f4cb2bb55a6f3610f531f8fd5a21d5c39547579a36ae2edae29feaf31dff77ce044bb53f8a26eccc430a924dfdb0aa95c353b9b52646be5550c464c1072f86c0d1370aa632897f2b91fc061406b81d59600b8a55765183454fb1daf8557c72c90714109d01390efba568c000100d48e153c63db15d272789a8ca6be2da4924aa00aeb9045ea84a2a1d760025658dd4db15dd3b9e493905a4650bd713d6e644a7aed89e53a89f09b411d80febd3d7252ef90819815183330fe0dc53557446b5254a5b226b96b1fa5bc84db208ace04ff42a4e24fce9293643014975360f68190a424e19f2fb11dc0895eab271c8ffdfa9c715417da7c4a000100d542c8404aa61095357b0f5542c13d2bd5e0cd0ae9bc19667fb8a3a3c58fe60ba54e6e96cc332ace89aab95855d5550d9914f81c370689ef353eb54b0d611b181e600fa72d7700007f000100f05903f99db99b980a7df6df33056e3ad0b5c51d4cfa7b6babd506ee5362461f00452e1c364128b80242b7964e26260dc3a09980f17a3c72ddb5709b9ffece3e092950067e310d1aee3d402eb261b26dcae78c0247c406206b17892c0e8f9e5f7527f4428d65874d0aa6e584b5706c4a4747edb2fc945eb9326f7d00"], 0x131c}, 0x1, 0x0, 0x0, 0xc}, 0x4000080) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r4, 0x9, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x118) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 09:50:45 executing program 0 (fault-call:4 fault-nth:0): open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1913.596699] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:45 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r3, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000500)={r3, 0x13b, "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"}, &(0x7f0000000040)=0x143) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000180)={'lo\x00'}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000101f18230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10}, 0x78) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000100)=0x1) r5 = socket(0x11, 0x800000003, 0x400) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1913.677973] FAULT_INJECTION: forcing a failure. [ 1913.677973] name failslab, interval 1, probability 0, space 0, times 0 [ 1913.732448] CPU: 0 PID: 11708 Comm: syz-executor.0 Not tainted 4.14.180-syzkaller #0 [ 1913.740364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1913.749721] Call Trace: [ 1913.752315] dump_stack+0x13e/0x194 [ 1913.755956] should_fail.cold+0x10a/0x14b [ 1913.760124] should_failslab+0xd6/0x130 [ 1913.764103] kmem_cache_alloc_trace+0x2db/0x7b0 [ 1913.768782] ? __lock_is_held+0xad/0x140 [ 1913.772878] alloc_pipe_info+0xaa/0x380 [ 1913.776866] splice_direct_to_actor+0x581/0x730 [ 1913.781541] ? avc_policy_seqno+0x5/0x10 [ 1913.785601] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1913.790480] ? do_splice_to+0x150/0x150 [ 1913.794464] ? rw_verify_area+0xe1/0x2a0 [ 1913.798532] do_splice_direct+0x164/0x210 [ 1913.802687] ? splice_direct_to_actor+0x730/0x730 [ 1913.807564] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1913.812586] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1913.817350] do_sendfile+0x469/0xaf0 [ 1913.821079] ? do_compat_pwritev64+0x140/0x140 [ 1913.825673] SyS_sendfile64+0x9b/0x110 [ 1913.829563] ? SyS_sendfile+0x130/0x130 [ 1913.833541] ? do_syscall_64+0x4c/0x640 [ 1913.837516] ? SyS_sendfile+0x130/0x130 [ 1913.841496] do_syscall_64+0x1d5/0x640 [ 1913.845398] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1913.850592] RIP: 0033:0x45ca29 [ 1913.853782] RSP: 002b:00007f2016191c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1913.861501] RAX: ffffffffffffffda RBX: 00000000004fc540 RCX: 000000000045ca29 [ 1913.868773] RDX: 0000000020000480 RSI: 0000000000000004 RDI: 0000000000000004 [ 1913.876053] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 09:50:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000040)=0x8, 0x4) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000700)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000400)={0x10c, 0x0, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1}, @ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x8d5}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKMODES_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0x10c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000010) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') memfd_create(&(0x7f0000000000)='ip6_vti0\x00', 0x5) sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r8, @ANYBLOB="00020000000000000000200000000c0099000300000000000000080001000200000057aa8eaeca20c9317c656346e8168efed376d47571de8ab98cbd08bffd4f66f4db39213c1292f2a69da3657bf5e9b7b36f9a2ce52444763d9b26a4f4624f775fbe58dccf4a62be952c23024cf089c8c93696fec9bd55db5e42c1ac4450352130239a7579b22d520000000000000006ee48f01e3af295f957e5613aba028a653937cf2dbe795747bb7c074f103e5f3a245c39093470446e3aed9c4cfdd015be60"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1913.883326] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 1913.890690] R13: 00000000000008dc R14: 00000000004cba16 R15: 00007f20161926d4 09:50:45 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="3c26feff040000104f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb492db023d489f5731f6930a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39df01ebe99e79b4f79e33fc49d96144b48a00ac059b492f92d314f93ee52ef5f40998466c4490cad5785854b2b838471fdeab6f8d7bcbccea18db3abfc0ad6838d78a141e21038c6c8855016614fa1da3c56b619060a744b5e83db8cd1e37c5a178efef615bd298026d36"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:45 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001e80)={&(0x7f00000002c0)={0xc0, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKSTATE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000040}, 0x11) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) r6 = socket(0xa, 0x1, 0x0) close(r6) socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r8, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000080)={r8, 0x3}, &(0x7f00000000c0)=0x8) [ 1914.001207] minix_free_inode: bit 1 already cleared [ 1914.011335] sctp: [Deprecated]: syz-executor.4 (pid 11716) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1914.011335] Use struct sctp_sack_info instead [ 1914.033264] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1914.108949] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1914.117462] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1914.146257] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x1f, 0x5, 0xea4}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:46 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:46 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x218000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x7, 0x8001, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r5, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000002c0)={r5, 0x1, 0x30, 0x0, 0x7ff}, &(0x7f0000000300)=0x18) r6 = dup(0xffffffffffffffff) r7 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r6, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="00040000", @ANYRES16=r7, @ANYBLOB="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", @ANYRES64, @ANYRESOCT=r3, @ANYBLOB, @ANYRES16=0x0, @ANYRESHEX=r2, @ANYRES32], 0x24}, 0x1, 0x0, 0x0, 0xc890}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r7, 0x1, 0x70bd27, 0x25dfdbfd}, 0x14}}, 0x80) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r7, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 09:50:46 executing program 0 (fault-call:4 fault-nth:1): open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1914.350997] minix_free_inode: bit 1 already cleared [ 1914.380057] SELinux: unknown mount option [ 1914.398530] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1914.446370] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1914.453986] FAULT_INJECTION: forcing a failure. [ 1914.453986] name failslab, interval 1, probability 0, space 0, times 0 [ 1914.459846] CPU: 0 PID: 11740 Comm: syz-executor.0 Not tainted 4.14.180-syzkaller #0 [ 1914.473443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1914.482890] Call Trace: [ 1914.485489] dump_stack+0x13e/0x194 [ 1914.489132] should_fail.cold+0x10a/0x14b [ 1914.493291] should_failslab+0xd6/0x130 [ 1914.497297] __kmalloc+0x2e9/0x7c0 [ 1914.500844] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1914.505687] ? alloc_pipe_info+0x156/0x380 [ 1914.509927] ? __lock_is_held+0xad/0x140 [ 1914.514002] alloc_pipe_info+0x156/0x380 [ 1914.518081] splice_direct_to_actor+0x581/0x730 [ 1914.522760] ? avc_policy_seqno+0x5/0x10 [ 1914.526858] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1914.531712] ? do_splice_to+0x150/0x150 [ 1914.535695] ? rw_verify_area+0xe1/0x2a0 [ 1914.539761] do_splice_direct+0x164/0x210 [ 1914.543913] ? splice_direct_to_actor+0x730/0x730 [ 1914.548768] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1914.553792] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1914.558560] do_sendfile+0x469/0xaf0 [ 1914.562315] ? do_compat_pwritev64+0x140/0x140 [ 1914.566913] SyS_sendfile64+0x9b/0x110 [ 1914.570805] ? SyS_sendfile+0x130/0x130 [ 1914.574788] ? do_syscall_64+0x4c/0x640 [ 1914.578765] ? SyS_sendfile+0x130/0x130 [ 1914.582754] do_syscall_64+0x1d5/0x640 [ 1914.586655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1914.591849] RIP: 0033:0x45ca29 [ 1914.595036] RSP: 002b:00007f2016191c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1914.602750] RAX: ffffffffffffffda RBX: 00000000004fc540 RCX: 000000000045ca29 [ 1914.610023] RDX: 0000000020000480 RSI: 0000000000000004 RDI: 0000000000000004 [ 1914.617298] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1914.624697] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 1914.631971] R13: 00000000000008dc R14: 00000000004cba16 R15: 00007f20161926d4 [ 1914.661160] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) getsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r6, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:46 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1914.719162] sctp: [Deprecated]: syz-executor.4 (pid 11716) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1914.719162] Use struct sctp_sack_info instead [ 1914.791548] minix_free_inode: bit 1 already cleared 09:50:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x104000, &(0x7f0000000140)='lo\x00') ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:46 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r4, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r5, r6}, 0x78) ioctl$KVM_SET_IRQCHIP(r4, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x2, 0x9, 0x4, 0x40, 0x7, 0x2, 0x8, 0x6, 0x9, 0x81, 0x4, 0x40, 0x4, 0x20, 0xea, 0x1f}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1914.883979] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:46 executing program 0 (fault-call:4 fault-nth:2): open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0xd0, r6, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4001}, 0x44) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r7, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r8, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1915.069199] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1915.089610] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1915.154646] FAULT_INJECTION: forcing a failure. [ 1915.154646] name failslab, interval 1, probability 0, space 0, times 0 09:50:47 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18050000070000000000000040000000197a0000ffffffff950000000000000059d16d73977913912d46077bc50d6404ebe743fcf039a3db9affe3206ec451bf028a6c232043bacbc2b34c78a263664d"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r4, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r5, r6}, 0x78) ioctl$IOC_PR_PREEMPT_ABORT(r6, 0x401870cc, &(0x7f0000000080)={0x1000, 0xd2, 0x0, 0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1915.247015] CPU: 1 PID: 11777 Comm: syz-executor.0 Not tainted 4.14.180-syzkaller #0 [ 1915.254959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1915.261729] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1915.264315] Call Trace: [ 1915.264337] dump_stack+0x13e/0x194 [ 1915.264355] should_fail.cold+0x10a/0x14b [ 1915.264372] should_failslab+0xd6/0x130 [ 1915.284892] __kmalloc+0x2e9/0x7c0 [ 1915.288441] ? check_preemption_disabled+0x35/0x240 [ 1915.293459] ? iter_file_splice_write+0x143/0xa10 [ 1915.298313] ? filemap_range_has_page+0x2c0/0x2c0 [ 1915.303166] ? perf_trace_lock+0x109/0x4b0 [ 1915.307410] iter_file_splice_write+0x143/0xa10 [ 1915.312116] ? ext4_file_read_iter+0x153/0x330 [ 1915.316706] ? generic_file_splice_read+0x3de/0x5d0 [ 1915.316947] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1915.321721] ? default_file_splice_read+0x870/0x870 [ 1915.321732] ? add_to_pipe+0x350/0x350 [ 1915.321748] ? avc_policy_seqno+0x5/0x10 [ 1915.321758] ? selinux_file_permission+0x7a/0x440 09:50:47 executing program 3: syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=@newtaction={0x90, 0x30, 0x8, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_bpf={0x78, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x45, 0x6, "ca19785c6961a224274671176524ed9288ddbad6017a25df07af9054f63a904e4f19b94a1dcc46f9a502841f4cabbbbc4192c08020852c085c6feb7cef8dee5460"}}}]}]}, 0x90}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4c0000003000010000000000000000000000000038ee87a4ae000100080001006270660024000280060003000000000018000200000000000000000000000000000000000000000004000600ab60c718bd03b1bb1e41e2a19b9b2de7717e4650e48d2e34864c7467d6b8f303cfd449045b7fce47ada46163a415d4a2f68a614654c902dda4d8627b0db3ebb9"], 0x4c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) close(0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x4e21, 0x7fff, @loopback, 0x8001}, @in={0x2, 0x4e20, @remote}], 0x3c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r5, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={r5, 0x9e4}, 0x8) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="4c0000003000010000f8937856244a0c6bd2000000000000000000000038000100349e1e000800010062706600240002800600030000000000000000000000000000000000000000000000000000000000040006002c55a048b5b5883fb01d68958e3e3cb833edf2f7517879b064995fbe854545ff8ab9260b6b0392"], 0x4c}}, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x10f4d0, &(0x7f00000001c0)=ANY=[@ANYBLOB="a332f96d01fa5749e5f3a3f51de3c8964559cce992b3b9ca51f6632dd7e25b731fd04ff8b885475c300c0695909cc6fbf97fd2c8c8265d89506728fc20e17947d627068fab9ba79c22dd54fcb9c9172d70f1809bd7"]) syz_mount_image$ext4(0x0, 0x0, 0xfffffffffffffffc, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000400)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x1}], 0x100488, 0x0) [ 1915.321779] ? rw_verify_area+0xe1/0x2a0 [ 1915.321789] ? default_file_splice_read+0x870/0x870 [ 1915.321802] direct_splice_actor+0x115/0x160 [ 1915.321816] splice_direct_to_actor+0x27e/0x730 [ 1915.363955] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1915.368807] ? do_splice_to+0x150/0x150 [ 1915.372791] ? rw_verify_area+0xe1/0x2a0 [ 1915.376857] do_splice_direct+0x164/0x210 [ 1915.381007] ? splice_direct_to_actor+0x730/0x730 [ 1915.385871] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1915.390892] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1915.396526] do_sendfile+0x469/0xaf0 [ 1915.400295] ? do_compat_pwritev64+0x140/0x140 [ 1915.404989] SyS_sendfile64+0x9b/0x110 [ 1915.408980] ? SyS_sendfile+0x130/0x130 [ 1915.410838] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1915.412959] ? do_syscall_64+0x4c/0x640 [ 1915.412971] ? SyS_sendfile+0x130/0x130 [ 1915.412985] do_syscall_64+0x1d5/0x640 [ 1915.413006] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1915.413021] RIP: 0033:0x45ca29 [ 1915.426820] tc_ctl_action: received NO action attribs 09:50:47 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1915.429546] RSP: 002b:00007f2016191c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1915.429560] RAX: ffffffffffffffda RBX: 00000000004fc540 RCX: 000000000045ca29 [ 1915.429567] RDX: 0000000020000480 RSI: 0000000000000004 RDI: 0000000000000004 [ 1915.429576] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1915.429583] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 1915.429590] R13: 00000000000008dc R14: 00000000004cba16 R15: 00007f20161926d4 [ 1915.532693] minix_free_inode: bit 1 already cleared 09:50:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) socket(0x11, 0x800000003, 0x400) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x808552a24476895d, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r6, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={r6, 0x0, 0x6, [0x1000, 0x1, 0x3f, 0x800, 0xf52, 0x1000]}, &(0x7f0000000040)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) [ 1915.644847] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1915.658934] tc_ctl_action: received NO action attribs [ 1915.671408] kauditd_printk_skb: 11 callbacks suppressed 09:50:47 executing program 0 (fault-call:4 fault-nth:3): open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1915.671416] audit: type=1800 audit(8032384247.541:651): pid=11804 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16453 res=0 [ 1915.687914] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:47 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8943, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1915.789297] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1915.847040] audit: type=1800 audit(8032384247.711:652): pid=11815 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16360 res=0 [ 1915.864010] sctp: [Deprecated]: syz-executor.4 (pid 11809) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1915.864010] Use struct sctp_sack_info instead [ 1915.918142] FAULT_INJECTION: forcing a failure. [ 1915.918142] name failslab, interval 1, probability 0, space 0, times 0 09:50:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r6, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r6, 0x10000, 0x1}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={r6, @in6={{0xa, 0x4e22, 0x7, @mcast1, 0x7fff}}, 0x3, 0xff56, 0x79ba36c9, 0x4, 0x5, 0xffff4939, 0x60}, &(0x7f0000000040)=0x9c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000003c0)={r7, 0x31, 0x3c, "ea552645f7bd643dbba63532d30b180a20d8d8d3d817e37e93fb39f5b619611d5167f0c6f4e4627f2b3bbf5276d5498aef626c60c8630d507f724be5"}, 0x44) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r8, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) write$fb(r4, &(0x7f0000000000)="9f41414c1240cffb34935b462b7af12f751b30dc72453616d6c1a75d6f47fd126867f5cc5f77b8900245d508d6aa06e27ff3ec00af58ed", 0x37) [ 1915.967627] CPU: 1 PID: 11820 Comm: syz-executor.0 Not tainted 4.14.180-syzkaller #0 [ 1915.975547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1915.984902] Call Trace: [ 1915.987500] dump_stack+0x13e/0x194 [ 1915.991229] should_fail.cold+0x10a/0x14b [ 1915.995387] should_failslab+0xd6/0x130 [ 1915.999459] kmem_cache_alloc+0x2b5/0x770 [ 1916.004057] ext4_init_io_end+0x23/0x100 [ 1916.008238] ext4_writepages+0x1037/0x2fd0 [ 1916.012827] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1916.018383] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1916.023515] ? mark_buffer_dirty+0x99/0x490 [ 1916.027861] ? ext4_mark_inode_dirty+0x7b0/0x7b0 [ 1916.033073] ? check_preemption_disabled+0x35/0x240 [ 1916.038806] ? SOFTIRQ_verbose+0x10/0x10 [ 1916.042879] ? ext4_mark_inode_dirty+0x7b0/0x7b0 [ 1916.047646] ? do_writepages+0xd0/0x250 [ 1916.051625] do_writepages+0xd0/0x250 [ 1916.055464] ? page_writeback_cpu_online+0x10/0x10 [ 1916.060409] ? lock_acquire+0x170/0x3f0 [ 1916.064386] ? do_raw_spin_unlock+0x164/0x250 [ 1916.068887] ? _raw_spin_unlock+0x29/0x40 [ 1916.073039] ? wbc_attach_and_unlock_inode+0x5bb/0x8e0 [ 1916.078326] __filemap_fdatawrite_range+0x236/0x310 [ 1916.083346] ? __lock_is_held+0xad/0x140 [ 1916.087410] ? replace_page_cache_page+0x6f0/0x6f0 [ 1916.092364] file_write_and_wait_range+0x86/0xd0 [ 1916.097129] __generic_file_fsync+0x70/0x190 [ 1916.101585] ext4_sync_file+0x757/0x12c0 [ 1916.105659] ? ext4_getfsmap+0x880/0x880 [ 1916.109726] vfs_fsync_range+0x103/0x250 [ 1916.113884] ext4_file_write_iter+0x639/0xdc0 [ 1916.118386] ? ext4_file_mmap+0x2b0/0x2b0 [ 1916.122540] ? __lock_is_held+0xad/0x140 [ 1916.126621] do_iter_readv_writev+0x3df/0x600 [ 1916.131133] ? vfs_dedupe_file_range+0x910/0x910 [ 1916.136077] ? rw_verify_area+0xe1/0x2a0 [ 1916.140171] do_iter_write+0x152/0x550 [ 1916.144083] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1916.149100] ? __kmalloc+0x36e/0x7c0 [ 1916.152819] ? iter_file_splice_write+0x143/0xa10 [ 1916.157674] ? filemap_range_has_page+0x2c0/0x2c0 [ 1916.162525] vfs_iter_write+0x70/0xa0 [ 1916.166335] iter_file_splice_write+0x52e/0xa10 [ 1916.171021] ? generic_file_splice_read+0x3de/0x5d0 [ 1916.176040] ? default_file_splice_read+0x870/0x870 [ 1916.181059] ? add_to_pipe+0x350/0x350 [ 1916.184956] ? avc_policy_seqno+0x5/0x10 [ 1916.189044] ? selinux_file_permission+0x7a/0x440 [ 1916.193906] ? rw_verify_area+0xe1/0x2a0 [ 1916.197974] ? default_file_splice_read+0x870/0x870 [ 1916.202999] direct_splice_actor+0x115/0x160 [ 1916.215928] splice_direct_to_actor+0x27e/0x730 [ 1916.224167] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1916.229020] ? do_splice_to+0x150/0x150 [ 1916.233002] ? rw_verify_area+0xe1/0x2a0 [ 1916.237126] do_splice_direct+0x164/0x210 [ 1916.241282] ? splice_direct_to_actor+0x730/0x730 [ 1916.246145] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1916.251207] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1916.255974] do_sendfile+0x469/0xaf0 [ 1916.259704] ? do_compat_pwritev64+0x140/0x140 [ 1916.264328] SyS_sendfile64+0x9b/0x110 [ 1916.268223] ? SyS_sendfile+0x130/0x130 [ 1916.272200] ? do_syscall_64+0x4c/0x640 [ 1916.276179] ? SyS_sendfile+0x130/0x130 [ 1916.280159] do_syscall_64+0x1d5/0x640 [ 1916.284056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1916.289245] RIP: 0033:0x45ca29 [ 1916.292471] RSP: 002b:00007f2016170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1916.300184] RAX: ffffffffffffffda RBX: 00000000004fc540 RCX: 000000000045ca29 [ 1916.307454] RDX: 0000000020000480 RSI: 0000000000000004 RDI: 0000000000000004 [ 1916.314829] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 09:50:48 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r5}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYRESHEX, @ANYRES64, @ANYRESOCT, @ANYBLOB="525561a0f67265cced68fef243832e8a048a952586fcbe2b9b39524a9ed7c894b69cf6425a3d0ce82b823a755e899f8412b5715ede519bff01dd61d0", @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32=r0, @ANYRESOCT=r7, @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x41000, 0xc, [], 0x0, 0x5, r6, 0x8, &(0x7f0000000440)={0x9, 0x200001}, 0x8, 0x10, &(0x7f0000000b40)={0x3, 0x2, 0x1, 0x2}, 0x10, r5, r7}, 0x78) ioctl$TCSETX(r4, 0x5433, &(0x7f0000000180)={0x6, 0x3ff, [0x4, 0x0, 0x3ff, 0x8001], 0x7ff}) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c00000030000100000000000000000000000000380001003400010008000100627066002400028006fdffffffffffffff000200000000000000000000000000000000000000000004000600"], 0x4c}}, 0x0) ioctl$FIOCLEX(r3, 0x5451) r8 = fcntl$dupfd(r1, 0x0, r2) syz_mount_image$nfs(&(0x7f00000001c0)='nfs\x00', &(0x7f0000000540)='./file0\x00', 0x2, 0x5, &(0x7f0000000ac0)=[{&(0x7f0000000580)="897da385e43fb765b74bcef72a388ed406daadd76de1f471a767ed3d021fd9434ceedb062a9eeb1ae0a54ecfb736ce93abcd36e7966b8b15f07c996233d29f174e9e6e3fe31adce7df29b70dfb5a2303c5d6dc6866ac35cad9e09cca63afac94009ec0a320211e1a34aaad45100fe0b98fd1a56a209a89b89a03256ae97e35e4d8448c28491e1f888b1b825e00a9429a9f229aabfa33a68ae4b7d22cfc4d002535e9747d97e8cfbd062e22c2fc368c8110c0eac8ed180c98cc2d4174555f1eaa106489d69c77e55d2c865f998c3b48d0708b52616316a0a7079e055b722d27247243d1d2b4e7d35f69909a040e", 0xed, 0x5}, {&(0x7f0000000680)="442bd0e8960270ca9cac987de3e472c5646963c0d0a8c935af508cfcefea77a024b5d38b642f73d1df2f9be363b6b9576109e13cab54d3e7a09dec", 0x3b, 0x1f}, {&(0x7f0000000800)="0a65acfa3807bb93d9b2630943a3f9a04add601830c573d21cf888262da7806f21aeef26cbe593956f196daedaf8c9a87f4f35e08698a59497440bba351fe5e5e0b826c18fedcc56ef325a4b086ae9b7edec99d253c69fddee948e0fd1a348792cbaa58b2d38e0f216f8daa3ddcabe0755dd190ebc1e15124907d78a2d1b3882a08278f55ab0d9307d8e9abb317ba7ee762eb209b05fe567207d3d32ff4801633ddd65fc6edf926f591138fe9bacb0943ec63bd634d6ca1e75ffa51472fe581a0e31", 0xc2, 0x383c03d}, {&(0x7f0000000900)="a545aea3b18abe2ae7fff316e06b832b2368d54b1d064588d4c3dc3b51b2c02f2e0096dda5f60a307bcc7f6c03dcec03217760f2912a2c3f9e59256edf19e0c0d06f753a72750d5d64bec40216bb0a3c3497ad18bfeafa9da1b3fc50c07d6d66e50c37bbf0a5195f59b99a6f1cf0db8fcf6a700f6c8d38ff60dbf283724a36592039c68a2e87ddf85e8078232619f0b79480d933874fcca5f3dded7c5cd4", 0x9e, 0x4}, {&(0x7f00000009c0)="c8a1e5503ca6c8f2604050129497e7f1a87cbd68b216b10aaaf7ab4b366c2d4ec789043a6a690222f8ba55bb3441f29c999b88e543bdacaca586511ed18c7ec03b65a6b1793191f3bc33324237954c10f2372334fbff07e97c3dfc42bc5e4930f383982d03451fb5d8c584ab3d11dce425e01e48920f57a0b607fb1081945baab79281d0a534678eb315d7cfd60834e3016938579f3ec33dd591d3d781e0f08d9639f4271a1d51401b5d0b91b90678ab3c12b9f6e2a2a875db20749ff56756e1f5994b299ea2e7c760a1233a7071662fc18549fb3d1c50297351e4700c15c5e3542dd6ec", 0xe4, 0x30636db0}], 0x20004, &(0x7f00000006c0)='\x00') write$P9_RLOCK(r8, &(0x7f0000000080)={0x8, 0x35, 0x1}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) 09:50:48 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1916.322139] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 1916.329415] R13: 00000000000008dc R14: 00000000004cba16 R15: 00007f20161716d4 [ 1916.392328] minix_free_inode: bit 1 already cleared [ 1916.393757] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1916.441110] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1916.462095] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:48 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x4b8, 0x4}) 09:50:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x15, &(0x7f0000000100)=""/59, 0x41100, 0x4, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r0, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r1, r2}, 0x78) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/108, &(0x7f0000000100)=0x6c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'lo\x00'}) r4 = socket(0x11, 0x800000003, 0x400) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:48 executing program 0 (fault-call:4 fault-nth:4): open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 09:50:48 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="636f6e74656be152"]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1916.606107] audit: type=1800 audit(8032384248.471:653): pid=11847 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16447 res=0 09:50:48 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x22) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r5}, 0x78) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4cec3324a349000000300001200000000000000000000000003800010034000100080008006270660024000280060003000000000018000200000000000000140000100000000000000002e29dca4c1e27"], 0x4c}}, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x4010, r6, 0x7a69c000) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) r8 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYRES32=r8, @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r4, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x89, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x3, 0x2}, 0x10, r5, r7}, 0x78) renameat2(r3, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000100)='./file0\x00', 0x5) r9 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) [ 1916.687311] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1916.689673] audit: type=1800 audit(8032384248.551:654): pid=11858 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15991 res=0 [ 1916.733526] FAULT_INJECTION: forcing a failure. [ 1916.733526] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.781949] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1916.798456] CPU: 0 PID: 11858 Comm: syz-executor.0 Not tainted 4.14.180-syzkaller #0 [ 1916.806493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1916.815888] Call Trace: [ 1916.818487] dump_stack+0x13e/0x194 [ 1916.822155] should_fail.cold+0x10a/0x14b [ 1916.826315] should_failslab+0xd6/0x130 [ 1916.830728] kmem_cache_alloc+0x44/0x770 [ 1916.835180] ? mempool_free+0x1d0/0x1d0 [ 1916.839252] mempool_alloc+0x111/0x2d0 [ 1916.843157] ? remove_element.isra.0+0x1b0/0x1b0 [ 1916.848507] ? __unlock_page_memcg+0x4f/0x100 [ 1916.853067] bio_alloc_bioset+0x352/0x640 [ 1916.857224] ? bvec_alloc+0x2d0/0x2d0 [ 1916.861233] ext4_bio_write_page+0x767/0xe7a [ 1916.865671] ? clear_page_dirty_for_io+0x1bc/0x7e0 [ 1916.871049] mpage_submit_page+0x128/0x220 [ 1916.875380] mpage_process_page_bufs+0x425/0x520 [ 1916.880154] mpage_prepare_extent_to_map+0x43e/0xa50 [ 1916.885366] ? __check_block_validity.constprop.0+0x2c0/0x2c0 [ 1916.891255] ? ext4_init_io_end+0x23/0x100 [ 1916.895568] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1916.900602] ? kmem_cache_alloc+0x604/0x770 [ 1916.904944] ext4_writepages+0x105f/0x2fd0 [ 1916.909185] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1916.914676] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1916.919698] ? mark_buffer_dirty+0x99/0x490 [ 1916.924046] ? ext4_mark_inode_dirty+0x7b0/0x7b0 [ 1916.928927] ? check_preemption_disabled+0x35/0x240 [ 1916.933968] ? SOFTIRQ_verbose+0x10/0x10 [ 1916.938041] ? ext4_mark_inode_dirty+0x7b0/0x7b0 [ 1916.942803] ? do_writepages+0xd0/0x250 [ 1916.947214] do_writepages+0xd0/0x250 [ 1916.951026] ? page_writeback_cpu_online+0x10/0x10 [ 1916.955964] ? lock_acquire+0x170/0x3f0 [ 1916.959968] ? do_raw_spin_unlock+0x164/0x250 [ 1916.964556] ? _raw_spin_unlock+0x29/0x40 [ 1916.968719] ? wbc_attach_and_unlock_inode+0x5bb/0x8e0 [ 1916.974441] __filemap_fdatawrite_range+0x236/0x310 [ 1916.979492] ? __lock_is_held+0xad/0x140 [ 1916.983561] ? replace_page_cache_page+0x6f0/0x6f0 [ 1916.988601] file_write_and_wait_range+0x86/0xd0 [ 1916.993367] __generic_file_fsync+0x70/0x190 [ 1916.997782] ext4_sync_file+0x757/0x12c0 [ 1917.002022] ? ext4_getfsmap+0x880/0x880 [ 1917.006103] vfs_fsync_range+0x103/0x250 [ 1917.010261] ext4_file_write_iter+0x639/0xdc0 [ 1917.014876] ? ext4_file_mmap+0x2b0/0x2b0 [ 1917.019029] ? __lock_is_held+0xad/0x140 [ 1917.023108] do_iter_readv_writev+0x3df/0x600 [ 1917.027618] ? vfs_dedupe_file_range+0x910/0x910 [ 1917.032392] ? rw_verify_area+0xe1/0x2a0 [ 1917.036470] do_iter_write+0x152/0x550 [ 1917.040399] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1917.045416] ? __kmalloc+0x36e/0x7c0 [ 1917.049220] ? iter_file_splice_write+0x143/0xa10 [ 1917.054069] ? filemap_range_has_page+0x2c0/0x2c0 [ 1917.059008] vfs_iter_write+0x70/0xa0 [ 1917.062850] iter_file_splice_write+0x52e/0xa10 [ 1917.068108] ? generic_file_splice_read+0x3de/0x5d0 [ 1917.073129] ? default_file_splice_read+0x870/0x870 [ 1917.078235] ? add_to_pipe+0x350/0x350 [ 1917.082146] ? avc_policy_seqno+0x5/0x10 [ 1917.086302] ? selinux_file_permission+0x7a/0x440 [ 1917.091160] ? rw_verify_area+0xe1/0x2a0 [ 1917.095570] ? default_file_splice_read+0x870/0x870 [ 1917.100590] direct_splice_actor+0x115/0x160 [ 1917.105020] splice_direct_to_actor+0x27e/0x730 [ 1917.109704] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1917.114576] ? do_splice_to+0x150/0x150 [ 1917.118559] ? rw_verify_area+0xe1/0x2a0 [ 1917.122628] do_splice_direct+0x164/0x210 [ 1917.126803] ? splice_direct_to_actor+0x730/0x730 09:50:49 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='context=']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x1, 0xff, 0x8, 0x0, 0x7ffd, 0x4308, 0xd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x100000000000de, 0x4}, 0x1088, 0xfffffffffffffffe, 0x4, 0x1, 0x5, 0x7fffffff, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x101, 0xbf, {0x0}, {r2}, 0x7fa6283d, 0x5}) tkill(r3, 0x26) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r0, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) mq_getsetattr(r0, &(0x7f0000000000)={0x2, 0x9, 0x1, 0x7ff}, &(0x7f0000000100)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1917.132439] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1917.137459] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1917.142223] do_sendfile+0x469/0xaf0 [ 1917.145952] ? do_compat_pwritev64+0x140/0x140 [ 1917.150549] SyS_sendfile64+0x9b/0x110 [ 1917.154627] ? SyS_sendfile+0x130/0x130 [ 1917.158607] ? do_syscall_64+0x4c/0x640 [ 1917.162579] ? SyS_sendfile+0x130/0x130 [ 1917.166656] do_syscall_64+0x1d5/0x640 [ 1917.170556] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1917.175763] RIP: 0033:0x45ca29 [ 1917.178952] RSP: 002b:00007f2016191c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1917.186672] RAX: ffffffffffffffda RBX: 00000000004fc540 RCX: 000000000045ca29 [ 1917.193943] RDX: 0000000020000480 RSI: 0000000000000004 RDI: 0000000000000004 [ 1917.201516] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1917.208900] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 1917.216169] R13: 00000000000008dc R14: 00000000004cba16 R15: 00007f20161926d4 [ 1917.245609] SELinux: unknown mount option 09:50:49 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000080)={0x0, 0x2}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8eb0ae8c75ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="181c0000070000000000000040000000197a0000ffffffff9500000000000000f7007b68328eca3ca77193cc0ef8853c5ae095b9026cccd0423a3be0bf32684965d440b7203424b5b5e6ea1f377b0ded39fd76c33dd76ed3e84eeb51672b8ad3e5894d8347afe15c70ee1bba3d0bd217888dcf565dff214b138cc5c257574353d9abd73cedb96e5cfdf4fa6ac2386fddd87ed9a734450fab0ecb227e2aeff1cdec146b740e3aafe3fe8a7d93"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r4, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r5, r6}, 0x78) connect$rose(r4, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r7}, 0x78) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000180)={0x0, 0x3f, 0x201b}) 09:50:49 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="f6000000070000000000000040000000197a0000ffffffff95000000000000005b681c0c8c5c131df016c8e2520e3f39df158d96f411f4e2c077130e75d23ccf6e99b90bea253ce5e12d15f472531458c6990f61c29b682f4cf0240f4b876363b9c16c7c2e20162de9d42f1b2b169655cf46532d124c8fbcee4a52a008aeb529249620f63f37fd46e65740cca9c8e06a92ae34c0a4d34e4b05c4d2345d0884816a02f3ca15fd4d1e9eb08150234131c478daa2085caa0e4bc8fe664ef6c8d867481734a2c5efc8b180828670dd024dbf1c2dbee87d81ad25c8bb154dd485474768b02a069f166eb18a7412050f2b58224820a4aba7ba4c851d82b2669159b0010c"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x74}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, &(0x7f0000000040), &(0x7f0000000100)=0x28) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@gettaction={0x2c, 0x31, 0x503, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}]}, 0x2c}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1917.307279] SELinux: security_context_str_to_sid(vents) failed for (dev bpf, type bpf) errno=-22 [ 1917.331305] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1917.370378] minix_free_inode: bit 1 already cleared 09:50:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r1, r2}, 0x78) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000300)={0x1, 0x1, 0x4, 0x4, 0x7, {}, {0x2, 0x1, 0xff, 0x4, 0xe5, 0x4, "6ca967a6"}, 0x1f, 0x4, @planes=&(0x7f0000000000)={0x5, 0x2d9, @userptr=0xd8f, 0x5}, 0x1, 0x0, 0xffffffffffffffff}) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r4 = socket(0x11, 0x800000003, 0x400) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r7, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r8, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1917.512150] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1917.525538] audit: type=1800 audit(8032384249.391:655): pid=11895 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16449 res=0 [ 1917.571706] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1917.583903] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1917.608789] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0xfffffff8}, 0x10, r4}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r2, 0x10, &(0x7f0000000180)={&(0x7f0000000540)=""/158, 0x9e, 0xffffffffffffffff}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000095, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x44}}, &(0x7f0000000640)='syzkaller\x00', 0x1e, 0x16, &(0x7f0000000100)=""/59, 0x41100, 0x6, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4003, 0xb, 0x7, 0x200}, 0x10, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180c00018000000000000000000000008500000079000000181a0000", @ANYRES16, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="200000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r7}, 0x78) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000100)) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000080)='4', 0x1}, {&(0x7f0000000280)='4', 0x1}, {&(0x7f00000012c0)='3', 0x1}], 0x3, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20181, 0x0) 09:50:49 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x101, 0x4, &(0x7f0000000400)=[{&(0x7f0000000140)="6e5df1d525d16175d6153ad1b3dc718f399c00bda7e23236b4dc5aa1c88f283ae6addb", 0x23, 0x8}, {&(0x7f0000000300)="170747bb0e4798858dd4676cd5a23b2bd586878527bc3e721382f9d212910416b753922d195e1c9729dae875fb50d9be926c21f88843868824b3a337cdc9a59bad", 0x41, 0xffffffffffffffe5}, {&(0x7f0000000380)="e2a75d14804aa64cf1edc508df30f81a237b93bc96ab2a5f2dfa14b738d3021dd2e252dc8c780676dcec00434761150fcf2ebd685eb80906f8505390566fd45973ea0c495859c6f400fa9e1d7f2a3e630e326f537937753466d7e713fd64b0374f97d35be4eec85851fc02a506fc9e", 0x6f, 0x80}, {&(0x7f0000000780)="eda9c66ecf0faa39a7185d3b32114d6871c0a0467f5486c8241110ca31c4e5dc69593d095e5f8e0cf48f8fba2fec970e7b915fe3cd84dac33bb20f0641126a917a94a955c5d50df5e6f05cc663490551c3dffbf52446b1f3e5197f29c10dd8af3d6ced922f5c9e5c5585ba994bce97e12fc122d4b61d6d89471d9a705cf53985088338108047d5637b30ab5e2d4250136dceb95ea69033302f17059e2048369ef1a614d52b2f692ec958edae492ce9289206aab73f0e01098f56d9eb820b01d40b90323adabf9110ef151dc537386df2b6e66623cd058271258e1998b65fe6f3ab2137624a99cfef0d26c7df0f86723b687d3888734e8acbbcc55a4cb5d0a588048a1ecd5043c27692e39abbf113922d1c0b1b980145c45c72356e94ef93644ccadd6a07ecbb6892ae12006cc184337bb99b65610dc3757fe689bf7ba075767baab3ab909e04e42c99a1d6c3a9429f0584e8560611014d8d1bd64998fce81472f557424da982481e880b2c90de96883b3461da4b84048170beca5ccfd31c817352befabed474c54fbc7ed177cafdbec8ad4369e6eb5d27e7b8ea57ec76358a0c21b4663eeb7bf89f05d2533074a7d0bbc6aee487e9ad283c415b5c04669cbe1742f12241e11af67605e02f977def2cf95c4e16ba5e8e63c8deb8bbb9723264f6955bdffab1e374651983a29ae35cacd7e17129169242b4f36ba0e35e8b39e5a0357d35705c756c5cad0fa1e6c4bc46817505ce662f665292a5504bf874fb198a7d709c7207d69e37477f7fc6edb588644768fbea312b1f76c41e657aa337b89a53a1ae63c5befbc416bae5a46a69cdc877ac58b18c3c87db5fb9f9fb2e45528dae4a562615bc3bf4a679127baa49508633969dc2a1304b6d3098d65d54c372f295716a39aa121075ff4e858bbc6a2bfd04b1a2c842af370002cb841289348f385d56982fbbf9530ed714b0ba367c864eeb1caa8a859d6fddb884fb143d4c560d28b34013e387097dc1fcf4a8d2fd7eeed864c5d85f4ea33e949f508c8db674347c955e970133f2dff98917e8fcc345d1c44eb9868be414a37d1e21c3e319fb9e7ef6465446fb717d4b584f2c8b756278a6df34757f5d7efbb386fa24f1c5905111a83fa826c07642a7c3158231e2edd071e49369778947c4c661173526d3a834857eca4683011b2c9d8cfd7400167221188b2921b14f89b78970069a740ff2d252967aa9f54fb31abef975eb0ec0726e99c9e2586bd919ae2a140d020f0e961b649e9d8a7d09c2f97f300597e1883f2c8dfad377fc1f91f7ffbfc9260032e6d5b0af4140cd27dbd1a2d98e2e5528391320b35caa3009876ee520adaca24bee7ba52e69530dcdbcf7e9e415d9aac6888a6f02fec41865f7c8481dccc7c55470d0acd322994c249e5fbc66171a8a4b7f2178e67b4af4291aaac950768e1d86d067862a8ca50183831976d04f956bb3d5c14c627d2f016e38b2d9a85cb5c84a8da469c821168f75d483dbe21e78131dbfed9f28629e37898955fb637c88b595d8832b51de444cecef614768fbfa92d2ab8aa5ae955d8938f486cc80ea89aee6b6a79e4efc85961dac37c62b57ca57ba9068d820fda90f48e1586a0af2e9e6284bf0df353cea2e0a11612da9dbfab79772dd846089cfb59c808718e4aaa9ce9a2293ce3c5e9836f7e4a8b1e564348fcefb5e820860ce7d54023a8a9bd4bc73a7b6e85e77da72666cfd2de8f89b57f6f3d1221243f00b83583bec90bf426a9d1db91efcd93ba9d729dbf716cea98832f15175824f9c65498425a12b4179a04f1983dd78101537444838f1bf7a0aad0aa4d5bc8430b5124270613b9e71e48de1c2c1fd758d7661b70becf9aecd502fb3463866092fa1816533b468232c6fab2f88523b82febf64d1296982de134b794cfa679cd1e5d76a2861906c80682cde138d702a80eb03db59fab63fde1cac75ff115f5c87d3c37be215185fbec1504990e70ca21018c92369868a891c7f8d24cbd4f8bcd5729eb47476cfd7c244df02ce60cbf85c4fa60cd0d1c81d141559abbf41bb3b1ef75d0fe7bfaf6e18b880d84381a14df4fcb2561d306fc134ff86e37de6164fb141d0464c7f1a2841f5faaa658d0e36c0afcd6d154651ba1c965723f2dd4a4619cf5138c96921dab6e0f4a9ba19c60124c490698c2455c77ab96fcec9892ca491d5bb4640cbb61e126c27adf8f9207aeaee84c2e0fe684b20b34b8f536a4d30ff74518fc7afd435177a9516832317e5392bc9eea5039370ce3a47f9f6aea9ca22fe49b48decd433d255a169001c62edc75e8ad8eeab7a063ccffe9792e84fbd8cfe1b054a91ac8fe83bd175bf8cb6c825a9ea52f1b699f442dc3964674fd4accb72b601acf2db86ec980842baa457240db4b6eba063d81640bd3f71d47aea70a7f2ac2f45c457959efe9f089176e95a891a7df42c93f7759a7082d793d4e9796ef1a5c19efe89d9cb27e96d0bc8d6f584ee2bff505de048d21df0b242d86a92964a7f830a96ce699fc73f25be157018837768872fad11d2c01a148478b577480a85920dbe8e5fdf634e76e3767f718a1c6b4721b33ef89f16aec31ea1ca1b32bddafa081a1bebf80b621de9ad0c88490a3b1d29b9a2a6ea03c002c807d4999934d6901272cba4beb248db97127a8c22db37358dfcc6de93addd02ab0dd5d8e61d7d70cd484fe71978215ddf5953e5c44a0360d210378b5b5c396b85bcf7f2bff7c72a4f85a51fbc20b18868ecb98b57aa8bd7882a1674ba993812543d21412909e51ede4c30cf587f6c9c52ff45a46a5caacd052afb0436b14a739e19f0d3702e4c965f0945f2b536eab913bea076fa9138150e472988a559594cb5410485ac6823a2a0761f35a38cb11fbf120ed0c7e13c564f54d3b3e27ff873fe6779508f10e0864f47de1c2a8a40f3570519036c45bcdbb03d2d5094dfea31f4c98dcf23cbecb293a1cd663a94115929abb000dce18a480f4e6cd5078f628610c6f753a1195b74e692da7d5dcbf86abde1ced6bd5ec4401c36c8931f782216a5203f1f1df7977e7558b3e4f000d58bfba42d4fc2d5a14051ccb19b08cdc3b0b04aa684e5389c932781e56ca2d5f14feea8d3dc2cebc0b5d0531916eef767aa7f179684ad55f4406574ff49470f3ba112709f0e098794bd0c8ac7360b287d042e3b4e02316978af1896d78aec7283bf322bd0b9f81a189f8716a2393492704f2062934c426d4839c10022af743e619b0659992893601e0e43034e367561cc22f339fd7f78b98e6c9b14ac6951e11f01047450d4d9a98dd4b3e33e54b69a0d17872bef93725eea7d79afc7071cbbc8573dbca0825412f7ec03f18216385785c39b0116439626600e53a51dd674cfce8845253610d61882e3a394a4ac3d78e07ce2735817e143f0d1feab96a7f66def058d2592ca3b893eb831b35053fb9ec4f32cc5c05f0d9dcfaa5b6cb7aaa66beaac5dbdd2f08e2156c64cca28d07062d8b957c3416d11037cd3289bf8d7c836d3ffbdf9a3b860e58a813d2b5392f62412e6afe748862c86f862065c72e0ae2d855d5e8221134d35c94ac04f2232e625dd087c2a1d8fb1c04468252d365f5ae61ad83bdaeeeaf7cd44d064d875dc49ac50b6d8279bc232787efd5a73d3a7b5e2fd1f2239de68db238793969718e21a9c54be1af547c1022640eddef8d6f48ba15420d627a2ea25ab73f8c5a2376d6075077e9941424cea77b49762222625a3ea7644d6a9d2dd25d37db062265900566d42ccefbe75c620b79fd22b82b0cf377e6b3882fc77c45c9d1fa10f2cfb2a87e19fe3ce1af4b696283bd25aff1a8be70cf8ed9eddc59d4198e5dff8c841bf3908f2fb735511730ae9953c592648859b68cc969b259affcbd543990af02f174feb4d781ffd19c0aff76400d9f10f4393ccb00d8bdd360b5ccec7492fb7f77aad72dd36a70406074ceac8f1cca6bbc408d875cbb14f064a7a727614bc3e432457c29199efd25f9c3feb0ea9456321bcec844e62267836a449c7368b8821aadfd033e62c5a703c0fd154d39f2a6d2105549e5c87e9ebae40db1bc5c70481320b86fcf075836973e5576de535f9e752ababc2100ed8326ad5ac0985f89bb1599c866f0d6a7dd3294a96b33f19c40e90abe1766e47413f934f70ae8c52b569d7666a4596f3647290ea23461b9950d73317e64f38dca06e9d49c88d153ec4dc1553e26dd093efb5205cc4a2a63884169fb68f07903720aa65e88c8ccd39d0fdd386fd7ce4af09f33d7b43bca74244a09826853ef0da9db2c75449eeb095b42a440ae258bfdcd24c3d43a82b7822b5e7629ee5981f3bf47af59428a2b015bbf4762b26e092cc8ff3bd184df7459eb0b5150c5b2ac14f93938bc081ca6c4bd498f618e1fe6bfd4a6ffe622b42293de7fa02590c559144ae7c8489449a9f94ee4c9f082a32a7d8b1067a60011f84eaf43ae18df1a0d42c5072546bb39b3e490d6ec49b58fc78e83673f59d4e2b06e06c6e580f7e848e2fa45c3c056e1e47d6b0ddf1ab483634893c89019675b09b6b4a8c5e6307be666c1a065cb595963fe03c8844948ceeced21ee2ba88c07d257761eb02b83d59b1a63dc192452f4152095fde16f524d2d47ff59670869f2b5ef8bc81cc0b0469b466ab80b89a18625eb76e40ca1f072422bef592685d7d85c00b95ceb52c17da465eba98e97edc8d0a71ebf7a69ba6d793929106edff7ebede093b047a1194f3762df229f389ed90904f8fdfcd65f7a8a3e14cac543ab7e5cb463de4dc8ae4910cf6da817a5a30f28b59f5df74afcbe98c3849b483d0740d8b6b3aaa10a7e09ffd5828b850f5d277344029385f384f833ac4feb00e9456c14484ad2e2bb11fa65f9f616c183f6484b68e02164d284265b0e9a0e06b0d5941bd7143d2e34649a4bd1d74ebcaddb13a78a0ec7d98e45ff734e9d68eecb3237acb39c88e33f0579dfca60589b867914675c028ba8788274bc32f7a670c29f96f5b1718ef89f86b931915bf89e6e0352c7d146294e736509a5c18d83c6bdbe134fbae8ea258b16f3f01c22d92db30ea92c385e7aa219899e76e3513daf5ad2182c68f878aae36a2370eb43cf7ee7a8c4bf8af060f8a778d78a280212fa5364695d3d5ef270552a4e783409313019d28687b7f7181efbee2a46ddf4318c52386a8154140577d5947eb2581b23e48ac7224224760b0d63788736c8d4ce6d19eec1815e4f53f44ba6311d2ce5789708f5fc30d181da3460caf8aa3a90e60cf43818ec29d880470597ed3a95e65246ab0a8f8d5acbee3da0d78f07d6f23ef4ccbfd36256ddacd0a8a853423855c2bf99f4e62c4d9a88d298cedd086321afa2607929827e12e81ca060cb67a688bb66c7a4740450cf5099ad12ea01d569fc11f5b90d097c8a1c0f7eff5b607771f35f2007220153736d337e49f3d1220a5e81a9cad100a2470e9635ff14a8eacf7a62025ef748b266d9e7fd20876b6044aac7d8ea5eb43b430d31a8ee142df4e01dacabe98a44c4215ba470c77c6a678d3fb707e23e973104d26ae0699280228772d96a1b190190038e6f22330db7db687a03ec66b512d5e4bdbc26b2afea15eb73f6fbe2f7c67a4c3c3a43c6306f31e7aabc428752a0a4afdf92d2b9dbc817e2a89baff360de7b77dfcb43c430b0cf312e9f5debd34640f57ce8abaad7649a62874e41e4231764ea53a055a0dbff822356abf506092e67107d33e49324c6fe79f32398b8c482729f87ba90c6bbd9f1b48f7c4c5bc04b189ded84fe476ecbd9142699ed096", 0x1000, 0x8}], 0x170c02, &(0x7f0000000480)={[{@autocell='autocell'}, {@flock_local='flock=local'}, {@dyn='dyn'}, {@flock_openafs='flock=openafs'}, {@flock_strict='flock=strict'}, {@flock_write='flock=write'}, {@flock_local='flock=local'}], [{@smackfshat={'smackfshat', 0x3d, '-'}}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, 'nl80211\x00'}}]}) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) ioctl$SIOCX25GCALLUSERDATA(r4, 0x89e4, &(0x7f00000005c0)={0x65, "dbe56d6cb64c7988d40aaf2c5b10e66f5bbb6fbf47ee085d16026ddab823771fa18ae71d945a3e8fb9ad761bca116300346dd55350e3cc7ec28e5c76b654025157ccc9154823e64786327b49ed91f1a97bccecb810cf0b9bc596f0ac41a84c4e270efa56fb27688cbf315b956702e07bc5c02e06132e1903958cf913d1375715"}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x6) [ 1917.839545] minix_free_inode: bit 1 already cleared 09:50:49 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="61c2"]) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r0, 0xae9a) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10000, 0x0, 0x4000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}}}]}]}, 0x4c}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 1917.928304] audit: type=1800 audit(8032384249.791:656): pid=11918 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16443 res=0 [ 1917.968204] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1917.989213] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1918.075855] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1918.250812] minix_free_inode: bit 1 already cleared 09:50:50 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r2, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r3, r4}, 0x78) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x9) 09:50:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x80000001}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x50845}, 0x20008810) dup(r1) sendmsg(r1, &(0x7f0000000340)={&(0x7f0000000100)=@rc={0x1f, @fixed={[], 0x11}, 0x9}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000400)="2d2a7779946b1fb35d32d16c3d5932054fdacc9fe078a96f84cd36059b755f7c0a599016f991b9194581fd30baee266505179237508e0ea3e0a3f8be47220196a702204aae67a213688ee204c64fcdbe9417ba4298dbf9bddc583691e53d41c23fdf0e340ece14dc", 0x68}], 0x1, 0x0, 0x1010}, 0x40000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @private=0xa010101, 0x0, 0x0, 'sh\x00', 0x18, 0x0, 0x3a}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) gettid() pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r3) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000002880)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002840)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000828bd700bfedbdf25110000000800a4000100000020004300ffffff483dd26df468b480a5f8000000000100000000b05ab550f225af2e3e12c0528f7fa07b4c196f38a8e3a911c625ecfe06f7797dcff9c7629d88708be4a90024e451d3d91e2672369e5a65c59075ef6490b7e82a399f5c9d41d6373e543ed92684e48c859b3f45c8ee1a344a5f37fa2334c52c7043046f0b5100603c1e125514cc8e8134caab327f3a198e2b4bfaba8a86507133cc6a705c6efd6cdfbc93fcd3a14d7e45c0eb9a9662516101248e", @ANYRES32=0x0, @ANYRESDEC], 0x5}, 0x1, 0x0, 0x0, 0x8801}, 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) connect$inet6(r4, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @dev, 0x9}, 0x1c) splice(r2, 0x0, r3, 0x0, 0x100000002, 0x0) 09:50:50 executing program 1: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x5e) close(r0) r1 = socket(0xa, 0x1, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r3, 0x0, 0x1}, 0xc) creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x7fffffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000004d00)={0x0, 0x3, 0xfffffffc, 0x40, 0xff01, 0x4, 0x3, 0xae, {r3, @in6={{0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, 0x8001, 0xffffffff, 0x3f, 0x0, 0x4faa}}, &(0x7f0000004dc0)=0xfffffffffffffe44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$DRM_IOCTL_UNLOCK(r6, 0x4008642b, &(0x7f0000000100)={0x0, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000000c0)=0x14) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x1, 0x80000, 0x4}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4cd79c003000010000000000000000000000000038000100340001000800010062706600240002800620030000020000000000000000000000000000000000000000000400060000000000007c17026edf4edf0636fa6ee10b59"], 0x4c}}, 0x0) fsync(r7) 09:50:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e23, @loopback}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000070000000000000040000000197a0000fffffffe75de230000009a2d60845b10bde13e0688a50615a9d44912260da1ac29ae06bbd2c89e5f229b2f0068756f863d32db4ff91afef8dfe448931aec85e1c6e23acb326fcd19f6fdfdf314ac3c770531307fef872d000000000000000000000000000000000006000000"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x7ff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r7, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) 09:50:50 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1918.368442] audit: type=1800 audit(8032384250.231:657): pid=11945 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16467 res=0 [ 1918.406992] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1918.447663] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1918.449968] audit: type=1800 audit(8032384250.301:658): pid=11951 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16474 res=0 09:50:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r0}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r0, r1}, 0x78) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f0000000000)=0x100000001) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r2, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r2, 0x1d7) r3 = socket$inet_sctp(0x2, 0x801, 0x84) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x0, 0x0) sendmsg(r3, &(0x7f0000000180)={&(0x7f00000009c0)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000a40)="b2", 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) [ 1918.580915] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:50:50 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, 0x0, 0x0, 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:50:50 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="529b3b9dd9977ed82cab38d34325a86c4b34eb70b75609ddf6641cb0a3e00e20082e60ae8ecc60d175268608f9383949f4235ab3206860975b5e0bc2b3b2ed6f13455d62d0bd0a399f674aacaa8149db40cfee6e32fd30f6fca8daec1cefe957b012d4196842ec0b8ed27bf32900d53c6130c330552f4d9d121e95aaf96710a0845a9d2e4a77ebfe38a58511f58883b743b8afced3e1aca4a6cda4c6b0c8373b2de07720d50ecab3e39fb57ce181abaf5b3a7083bb4023f6ccefb74408edc5b194a1512fa82262f3b7", 0xc9, 0x6}, {&(0x7f0000000240)="7fce2e8ec0c1da4a74ef1136f85e36ee75388ad3d052dddf279ed5b2aa357da4b6", 0x21, 0x9}, {&(0x7f0000000280)="b443e94fa0a4a072bba161bfa98ef857f957ee30dd95fda1c893d628a58a257d6147e1975422ebe39927e03f6968b97128295b8581c91cbe98c7df96a085d605f517591ac6cf575de3c6caeb0c1f48e3298073480a417c9e0d39a015eaca2d80eccd4e0ecadf4084737bc2164bb7a2604ef445febcad6cd03b22975289280152cde7f8d405db8130fcad70cdb5b61e52794fb60f8aa8625954237f2bcd21207e1f07f962bae0d21b90bb", 0xaa}, {&(0x7f0000000340)="07ec87fd45382018a3a33d808d508e68711a821e334526607b67d5408a111475f96552662b5c922ae0a84572856d1a451a4164496b267ae4e2b69c3573b82b83848ba088c8234fbf1171371ae791dd25b3d3569194527a3a6cfa5074ce1a4f15ad38d7daad43d5cdaa430191ac15cf765dea58d24fc6927c7d5e08589f2f59b779780af77a3816d37cfdf793a73b98200ab56db3f203fcd80c5528f0d93fc29b316fd8a3c858177de1f4d74a65d40d7255332b10440bce3948d67aac69a3592c24a09133734c8cb95eec796d559598c46aa4e9decb", 0xd5, 0x400}, {&(0x7f00000004c0)="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", 0xfa, 0x4000000000000003}, {&(0x7f00000008c0)="c11ff026b2fb8a663cde3270aaf5f0f08ed26eb6c2659c083b1e416cb07ef977fb24cd1bab3e1525af3ec6711a1658478d34787f8424882e8fad9475d265d58b2cdbaeb1b6e3b7d80bc93f463481c066c659b86a1f04236c55c7f1627324e0a173ea1a2d081bd020046cf4dc14dddba2adb92de516bfe8b2251b59f5d0bacfed66e5af4881a2df1df3d375b2d5967302e5965e4ee91d63a42a1c812f40a2ad3be0a41e596c213289b71f644b70910ee4e700809bbeef6556281847419381", 0xbe, 0x3}, {&(0x7f0000000440)="8c7e28bfc0956ab5db4ead170b4c4ff4f5abd226a1e8c436fe5a99a13d5c5cbcc01908befce0324a7b12332b4fb9586188a06251c018c91b34", 0x39, 0xb8a}, {&(0x7f0000000680)="62b19032fd1ebfe7c9778da419b6f862729106224ae9b88b22fdab127e1a7c1ae930f58cd2848b6ccc2e", 0x2a, 0x100000001}], 0x800000, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r2}, 0x78) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r2}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r1, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r2, r4}, 0x78) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f0000000980)={{0xd000, 0x0, 0xd, 0x2, 0x7, 0x4, 0x8, 0x7f, 0x9, 0x1a, 0x0, 0x20}, {0x102002, 0xf000, 0x3, 0xfc, 0xff, 0xb8, 0x5f, 0x2, 0x6, 0x40, 0x1, 0x7}, {0x1000, 0x1, 0xd, 0x3, 0x3, 0x5, 0x4, 0x7, 0x1f, 0x40, 0x40, 0x8}, {0x6000, 0x4, 0x10, 0x1, 0x8, 0xb1, 0x2, 0x81, 0x68, 0x8}, {0x5000, 0x2000, 0xb, 0x80, 0x1, 0x6a, 0x2, 0x83, 0x81, 0x1, 0x80, 0x3f}, {0xd000, 0x4, 0xe, 0xff, 0x2, 0xf0, 0x3f, 0x2, 0xff, 0x1, 0xb1, 0x81}, {0x1, 0x4, 0x10, 0x40, 0x81, 0x0, 0x29, 0xfe, 0x4, 0x0, 0x8, 0x3f}, {0xf000, 0x1, 0x0, 0x7f, 0x1, 0x2, 0x40, 0x3, 0x40, 0x1f, 0x0, 0x80}, {}, {0x5000, 0x7}, 0x40000008, 0x0, 0x10c000, 0x44000, 0xe, 0x100, 0x0, [0x1, 0x10001, 0x4, 0xc7c4]}) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r3, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) [ 1918.802179] minix_free_inode: bit 1 already cleared 09:50:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x5, 0x3ff) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000000)={0x1, 0x40, 0x3, 0x4, 0x8000}) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x442, 0x0) ioctl$IMDELTIMER(r5, 0x80044941, &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="1900000007000000000000004000000019ba0000ffffffff9500000000000000415aa56491aa0b46758f2f33500839f2aeb5f3f9ef5a1f1e48aa1d5617039b767db4124aef994ab15f5455a16dfda7eedd970576addf15d6b7aa8bb4a8974846748b164602007581bd4f01361b679d9875f30feee4617115d333"], &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, 0x0, r6}, 0x78) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000280), &(0x7f0000000300)=0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1000}, 0x4, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYRESOCT, @ANYRES16=r1], 0x28}, 0x1, 0x0, 0x0, 0x20000850}, 0xda8507ad3487e5e) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1918.845720] audit: type=1800 audit(8032384250.711:659): pid=11966 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15991 res=0 09:50:50 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x1, 0xcf, 0x1000}, {0x1, 0xfff}, {0x1, 0x401, 0x3800}, {0x1, 0x1}, {0x2, 0x6, 0x800}], 0x5, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000001c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/btrfs-control\x00', 0x42480, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000600)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028258c7e9d1f8ce8f5b91d2981bb4b9fec39ed9200ecbeb72119bf669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e391360b6"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x5, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="00f5ffff7e0000109500000000000000950000000000000018270000", @ANYRES32=r2, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) sendmsg$IPSET_CMD_TYPE(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0xd, 0x6, 0x801, 0x0, 0x0, {0x7, 0x0, 0xa}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) [ 1918.920530] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1918.937088] audit: type=1800 audit(8032384250.801:660): pid=11972 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=15999 res=0 09:50:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x400) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800ffec", @ANYRES16=r5, @ANYBLOB="00020000000000000000200000000c00990003000000000000000800010002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) writev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffdd0606040000000000000000", 0x39}], 0x1) [ 1918.971315] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:50:50 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f0000000480), 0xa198) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, 0x0, 0x0, 0x0, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1919.131813] minix_free_inode: bit 1 already cleared [ 1919.155663] sctp: [Deprecated]: syz-executor.1 (pid 11955) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1919.155663] Use struct sctp_sack_info instead [ 1919.160589] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1919.195851] ================================================================== [ 1919.195962] BUG: KASAN: slab-out-of-bounds in soft_cursor+0x445/0xa40 [ 1919.195972] Read of size 8 at addr ffff8880a809ee50 by task syz-executor.4/11976 [ 1919.195976] [ 1919.195987] CPU: 1 PID: 11976 Comm: syz-executor.4 Not tainted 4.14.180-syzkaller #0 [ 1919.195994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.195999] Call Trace: [ 1919.196014] dump_stack+0x13e/0x194 [ 1919.196028] ? soft_cursor+0x445/0xa40 [ 1919.196042] print_address_description.cold+0x7c/0x1e2 [ 1919.196055] ? soft_cursor+0x445/0xa40 [ 1919.196065] kasan_report.cold+0xa9/0x2ae [ 1919.196077] memcpy+0x20/0x50 [ 1919.196090] soft_cursor+0x445/0xa40 [ 1919.196111] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1919.196127] bit_cursor+0x10d9/0x1700 [ 1919.196148] ? bit_clear+0x460/0x460 [ 1919.196158] ? SOFTIRQ_verbose+0x10/0x10 [ 1919.196173] ? fb_release+0x131/0x140 [ 1919.196186] ? fb_get_color_depth+0x5a/0x70 [ 1919.196197] ? get_color+0x1b8/0x3a0 [ 1919.196212] fbcon_cursor+0x4be/0x690 [ 1919.196222] ? bit_clear+0x460/0x460 [ 1919.196254] hide_cursor+0x7a/0x2a0 [ 1919.196281] ? lock_downgrade+0x6e0/0x6e0 [ 1919.196295] redraw_screen+0x2a1/0x770 [ 1919.196310] ? con_flush_chars+0x80/0x80 [ 1919.196329] vc_do_resize+0xbe0/0xde0 [ 1919.196351] ? vt_console_print+0xec0/0xec0 [ 1919.196371] vt_ioctl+0x1a64/0x1f20 [ 1919.196384] ? complete_change_console+0x350/0x350 [ 1919.196394] ? avc_ss_reset+0x100/0x100 [ 1919.196403] ? __lock_acquire+0x5f7/0x4620 [ 1919.196424] ? __lock_acquire+0x5f7/0x4620 [ 1919.196472] ? tty_jobctrl_ioctl+0x3b/0xbf0 [ 1919.196482] ? complete_change_console+0x350/0x350 [ 1919.196525] tty_ioctl+0x6c5/0x1220 [ 1919.196538] ? tty_vhangup+0x30/0x30 [ 1919.196552] ? check_preemption_disabled+0x35/0x240 [ 1919.196588] ? tty_vhangup+0x30/0x30 [ 1919.196603] do_vfs_ioctl+0x75a/0xfe0 [ 1919.196614] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1919.196628] ? ioctl_preallocate+0x1a0/0x1a0 [ 1919.196652] ? security_file_ioctl+0x76/0xb0 [ 1919.196663] ? security_file_ioctl+0x83/0xb0 [ 1919.196677] SyS_ioctl+0x7f/0xb0 [ 1919.196686] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1919.196701] do_syscall_64+0x1d5/0x640 [ 1919.196721] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1919.196730] RIP: 0033:0x45ca29 [ 1919.196736] RSP: 002b:00007f7436328c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1919.196748] RAX: ffffffffffffffda RBX: 00000000004f2b00 RCX: 000000000045ca29 [ 1919.196754] RDX: 00000000200000c0 RSI: 000000000000560a RDI: 0000000000000004 [ 1919.196761] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1919.196767] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1919.196773] R13: 0000000000000673 R14: 00000000004c9681 R15: 00007f74363296d4 [ 1919.196795] [ 1919.196801] Allocated by task 19295: [ 1919.196811] save_stack+0x32/0xa0 [ 1919.196819] kasan_kmalloc+0xbf/0xe0 [ 1919.196827] __kmalloc+0x15b/0x7c0 [ 1919.196837] fbcon_set_font+0x2f8/0x7c0 [ 1919.196846] con_font_op+0xb73/0xf70 [ 1919.196854] vt_ioctl+0x736/0x1f20 [ 1919.196863] tty_ioctl+0x6c5/0x1220 [ 1919.196872] do_vfs_ioctl+0x75a/0xfe0 [ 1919.196880] SyS_ioctl+0x7f/0xb0 [ 1919.196889] do_syscall_64+0x1d5/0x640 [ 1919.196899] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1919.196902] [ 1919.196907] Freed by task 18141: [ 1919.196916] save_stack+0x32/0xa0 [ 1919.196924] kasan_slab_free+0x75/0xc0 [ 1919.196931] kfree+0xcb/0x260 [ 1919.196942] skb_free_head+0x83/0xa0 [ 1919.196952] skb_release_data+0x528/0x7b0 [ 1919.196960] skb_release_all+0x46/0x60 [ 1919.196968] consume_skb+0xa7/0x330 [ 1919.197016] sctp_chunk_put+0x167/0x250 [ 1919.197052] sctp_packet_transmit+0x1021/0x2d70 [ 1919.197062] sctp_outq_flush+0xc54/0x2dd0 [ 1919.197099] sctp_do_sm+0x419/0x4a90 [ 1919.197109] sctp_assoc_bh_rcv+0x2a2/0x5d0 [ 1919.197117] sctp_inq_push+0x1be/0x250 [ 1919.197124] sctp_backlog_rcv+0x110/0x860 [ 1919.197133] __release_sock+0x12a/0x350 [ 1919.197141] release_sock+0x54/0x1b0 [ 1919.197149] sctp_sendmsg+0x10b3/0x2d60 [ 1919.197204] inet_sendmsg+0x116/0x4d0 [ 1919.197213] sock_sendmsg+0xc5/0x100 [ 1919.197222] sock_no_sendpage+0xe5/0x110 [ 1919.197229] kernel_sendpage+0xb1/0xd0 [ 1919.197236] sock_sendpage+0x84/0xa0 [ 1919.197245] pipe_to_sendpage+0x226/0x2d0 [ 1919.197254] __splice_from_pipe+0x332/0x740 [ 1919.197262] splice_from_pipe+0xc6/0x120 [ 1919.197271] direct_splice_actor+0x115/0x160 [ 1919.197279] splice_direct_to_actor+0x27e/0x730 [ 1919.197286] do_splice_direct+0x164/0x210 [ 1919.197296] do_sendfile+0x469/0xaf0 [ 1919.197305] SyS_sendfile64+0xff/0x110 [ 1919.197314] do_syscall_64+0x1d5/0x640 [ 1919.197323] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1919.197326] [ 1919.197334] The buggy address belongs to the object at ffff8880a809ed40 [ 1919.197334] which belongs to the cache kmalloc-512 of size 512 [ 1919.197342] The buggy address is located 272 bytes inside of [ 1919.197342] 512-byte region [ffff8880a809ed40, ffff8880a809ef40) [ 1919.197346] The buggy address belongs to the page: [ 1919.197355] page:ffffea0002a02780 count:1 mapcount:0 mapping:ffff8880a809e0c0 index:0xffff8880a809e340 [ 1919.197365] flags: 0xfffe0000000100(slab) [ 1919.197379] raw: 00fffe0000000100 ffff8880a809e0c0 ffff8880a809e340 0000000100000004 [ 1919.197391] raw: ffffea00025f4c60 ffffea00021350e0 ffff88812fe54940 0000000000000000 [ 1919.197396] page dumped because: kasan: bad access detected [ 1919.197399] [ 1919.197403] Memory state around the buggy address: [ 1919.197412] ffff8880a809ed00: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 1919.197419] ffff8880a809ed80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1919.197427] >ffff8880a809ee00: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 1919.197433] ^ [ 1919.197441] ffff8880a809ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1919.197449] ffff8880a809ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1919.197453] ================================================================== [ 1919.197457] Disabling lock debugging due to kernel taint [ 1919.197463] Kernel panic - not syncing: panic_on_warn set ... [ 1919.197463] [ 1919.197474] CPU: 1 PID: 11976 Comm: syz-executor.4 Tainted: G B 4.14.180-syzkaller #0 [ 1919.197480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.197483] Call Trace: [ 1919.197495] dump_stack+0x13e/0x194 [ 1919.197509] panic+0x1f9/0x42d [ 1919.197518] ? add_taint.cold+0x16/0x16 [ 1919.197530] ? lock_downgrade+0x6e0/0x6e0 [ 1919.197539] ? add_taint.cold+0x5/0x16 [ 1919.197551] ? soft_cursor+0x445/0xa40 [ 1919.197561] kasan_end_report+0x43/0x49 [ 1919.197581] kasan_report.cold+0x12f/0x2ae [ 1919.197593] memcpy+0x20/0x50 [ 1919.197604] soft_cursor+0x445/0xa40 [ 1919.197619] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1919.197632] bit_cursor+0x10d9/0x1700 [ 1919.197648] ? bit_clear+0x460/0x460 [ 1919.197657] ? SOFTIRQ_verbose+0x10/0x10 [ 1919.197669] ? fb_release+0x131/0x140 [ 1919.197679] ? fb_get_color_depth+0x5a/0x70 [ 1919.197689] ? get_color+0x1b8/0x3a0 [ 1919.197701] fbcon_cursor+0x4be/0x690 [ 1919.197710] ? bit_clear+0x460/0x460 [ 1919.197722] hide_cursor+0x7a/0x2a0 [ 1919.197731] ? lock_downgrade+0x6e0/0x6e0 [ 1919.197742] redraw_screen+0x2a1/0x770 [ 1919.197755] ? con_flush_chars+0x80/0x80 [ 1919.197770] vc_do_resize+0xbe0/0xde0 [ 1919.197788] ? vt_console_print+0xec0/0xec0 [ 1919.197804] vt_ioctl+0x1a64/0x1f20 [ 1919.197816] ? complete_change_console+0x350/0x350 [ 1919.197825] ? avc_ss_reset+0x100/0x100 [ 1919.197834] ? __lock_acquire+0x5f7/0x4620 [ 1919.197850] ? __lock_acquire+0x5f7/0x4620 [ 1919.197859] ? tty_jobctrl_ioctl+0x3b/0xbf0 [ 1919.197867] ? complete_change_console+0x350/0x350 [ 1919.197878] tty_ioctl+0x6c5/0x1220 [ 1919.197888] ? tty_vhangup+0x30/0x30 [ 1919.197899] ? check_preemption_disabled+0x35/0x240 [ 1919.197920] ? tty_vhangup+0x30/0x30 [ 1919.197932] do_vfs_ioctl+0x75a/0xfe0 [ 1919.197942] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1919.197954] ? ioctl_preallocate+0x1a0/0x1a0 [ 1919.197973] ? security_file_ioctl+0x76/0xb0 [ 1919.197982] ? security_file_ioctl+0x83/0xb0 [ 1919.197992] SyS_ioctl+0x7f/0xb0 [ 1919.198001] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1919.198013] do_syscall_64+0x1d5/0x640 [ 1919.198027] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1919.198034] RIP: 0033:0x45ca29 [ 1919.198040] RSP: 002b:00007f7436328c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1919.198050] RAX: ffffffffffffffda RBX: 00000000004f2b00 RCX: 000000000045ca29 [ 1919.198055] RDX: 00000000200000c0 RSI: 000000000000560a RDI: 0000000000000004 [ 1919.198061] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1919.198067] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1919.198072] R13: 0000000000000673 R14: 00000000004c9681 R15: 00007f74363296d4 [ 1919.199110] Kernel Offset: disabled [ 1920.053358] Rebooting in 86400 seconds..