c}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2c}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2da27de}]}, 0x120}, 0x1, 0x0, 0x0, 0x8000}, 0x80) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) sendmmsg$inet_sctp(r2, &(0x7f0000871fc8), 0x4924924924925d0, 0x0) 00:24:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x404001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0xf0}, 0x8) ioctl$TIOCNXCL(r0, 0x540d) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000300)=0x3) 00:24:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 442.223267] minix_free_inode: bit 1 already cleared 00:24:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1, &(0x7f0000000080)="0a54c80700365f6a9f3032c485715070") r1 = memfd_create(&(0x7f00000000c0)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x1, 0x1, 0x0, "7c5206ddc03c570fb503cf1ae125cfd0c7e0f30f657e036d8beab09fd20f016238cbff8b71b3515ce4ec8200", "c3174cfe994a2869e5662e1e2a72e0fb4aee287df2df380b95e5b25a31c8f999938bfe8bf214ff8e583ea7b0e03ff510bcddd4757451a798594da244e721450c", "bc9d5d30fa470f4bc805ee69eb0a6dd3293522c750d67f000020f92000000f00", [0x0, 0x2000]}) ioctl(r1, 0xed, &(0x7f0000000100)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000040)={0x5, 0x1, 0x9, 0xd8b, '\x00', 0xfff}) 00:24:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:19 executing program 7: io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x2000, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x6, r1, &(0x7f0000000040)="313410dfa9975d18e869534abc33bd6e9c9d1dd47baee5739cbde6a6efd3e3bbb67b1338e53ac7dc57114330e02cfa60f02fbb64996c6d2745ca8bed8aa36e4fab355d622ba733a29345a8a734fed9737ceac47232531d108bd723443f64af15387674a8946512cfeceb3d87db75919575132d06", 0x74, 0x200, 0x0, 0x1, r2}, &(0x7f0000000140)) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) move_pages(r4, 0x37a, &(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0), 0xfffffffffffffffd) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x54, r5, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x32}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4048800}, 0x80) [ 442.360103] minix_free_inode: bit 1 already cleared 00:24:19 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="7f4548460000000000000000000000000200010081000000"], 0x18) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) write$P9_RWALK(r2, &(0x7f0000000180)={0x57, 0x6f, 0x2, {0x6, [{0xe0, 0x4, 0x3}, {0x1, 0x0, 0x4}, {0x4, 0x3, 0x2}, {0x2, 0x1, 0x7}, {0xb4, 0x1, 0x8}, {0x95, 0x3, 0x8}]}}, 0x57) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x78) [ 442.860068] minix_free_inode: bit 1 already cleared [ 443.162601] minix_free_inode: bit 1 already cleared [ 443.279167] minix_free_inode: bit 1 already cleared 00:24:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x5385) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x7f}}, 0x18) 00:24:21 executing program 0: unshare(0x64000400) r0 = socket(0xf, 0x80000, 0x84) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)={0x0, 0x81, 0x0, 0x2, 0x492492492492659}) ioctl(r0, 0x8916, &(0x7f0000000000)) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) 00:24:21 executing program 7: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00008acff8)=@abs={0x1}, 0x8) listen(r0, 0x0) socket$inet(0x2, 0x807, 0x7fff) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)="e9a79e1c8633fd46f55d233c6e48cde940b602d789cccf35366e6ae7b19c7959d2380227f5f4f00d90aa96a7e5674d8af9249e0cf72f1c1a433f44a51f2231187ebf700a54f1c3a58636bc6765f03027d21b51d8e1e5a85d007c05139fe058fd3310f03ad5e34793acaa603532fca6cfcbae289ef04831bd2830e8afe96b85994eeeceab6c55e7d006e4dfdcb8b006437e682b096f31ca3a") ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000100)={0x6, 0x5000}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000fe1000), 0x4) 00:24:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:21 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:21 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000200)=0x81, 0xffffffffffffffcf) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='yeah\x00', 0x25f) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e21}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x3cc, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 00:24:21 executing program 7: syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x401, 0x2800) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f00000017c0)=ANY=[]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) getsockname(r1, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0x80) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0), 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x103001, 0x0) [ 444.861364] XFS (loop7): Invalid superblock magic number 00:24:22 executing program 7: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x3) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4000, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x8}}, 0x18) 00:24:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x200, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x7, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f000082ef0a)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) semget$private(0x0, 0x0, 0x80) 00:24:22 executing program 7: r0 = userfaultfd(0x0) userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f000028a000/0x3000)=nil, 0x3000}, 0x1}) r1 = gettid() r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)=""/73, &(0x7f00000002c0)=""/129, &(0x7f0000000380)=""/236, 0x6000}) finit_module(r0, &(0x7f0000000480)='&selinuxlo-\x00', 0x3) r3 = dup2(r0, r2) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000e5ffffffffffff6e000000c6db1b4de4b67b61396c6d563c2a72d72a06a4f6ecb97d85734282c8b32b5be9d89d042ac08b19a207fe92960ed77067fd337f1d57a076b8a87869d16954c221e732cae15b86d0877632a673b030026b776bdedae0ad636734cd167714a545a3e39873e31fef4cf51d7071b985d338"], &(0x7f0000000580)=0x93) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000083000/0x2000)=nil, 0x2000}, 0x1}) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f00000005c0)={0x1, 0x93}) process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x7ffff000}], 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000001, 0x32, 0xffffffffffffffff, 0x0) close(r0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xb37, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000600)={0xea3b, 0x6, 0x10001}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x6) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) [ 445.313718] IPVS: ftp: loaded support on port[0] = 21 [ 445.348870] IPVS: ftp: loaded support on port[0] = 21 00:24:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ioctl(r1, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000100)="058ccaeaee61c90ac6c1dfcb3d1fa4ce", 0x10}], 0x1) recvfrom(r2, &(0x7f0000002900)=""/4096, 0xfffffffffffffef6, 0x0, 0x0, 0x2ba) 00:24:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:22 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 445.521215] minix_free_inode: bit 1 already cleared [ 445.548676] minix_free_inode: bit 1 already cleared [ 445.554460] minix_free_inode: bit 1 already cleared [ 445.572325] minix_free_inode: bit 1 already cleared [ 445.994267] minix_free_inode: bit 1 already cleared [ 446.100088] minix_free_inode: bit 1 already cleared 00:24:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 00:24:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:24 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:24 executing program 6: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000018ff4), 0xc, &(0x7f0000013ff1)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000028000100000000000000000001000000675f189608000000", @ANYRES32=0x0], 0x20}}, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000000c0)) 00:24:24 executing program 7: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa3a00fe8000000000000000000000000000bbff02000004000000000000000000000100000000000890787684fd7d2e560724ce48880f1d2ce989a69658e08433523e9fa25d79e37e19f1b507436ef040550f1427b6f405f400d13ed77c591eec00"], &(0x7f0000000080)) 00:24:24 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) rt_sigsuspend(&(0x7f0000000040), 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, r1, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 00:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0xfd06, 0x20000008, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r0, r2, &(0x7f0000000000), 0x6) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x5, @remote, 0x1f}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e23, 0x1f, @local, 0x3}}, 0x693, 0x6f1c, 0x2, 0x982, 0xffffffffffffffc5}, &(0x7f0000000300)=0x98) write(r0, &(0x7f00000001c0)="b0", 0x1) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080)={0xa, 0x5, 0xf0, 0xfffffffffffff68f}, 0xa) 00:24:24 executing program 6: unshare(0x2000600) unshare(0x2000400) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="c90000008dfe888a62f80ebc30b86a1a11a1779994d081572705755782370dbdbfbe78d7c5019aa55097e3cbe6759a2164c4e8877658782fbea6f52ca3c183528fdba6bbfb662055ed1434083c9fd059829b3f445500e29f79f9d68eaef9654accc2e49bec7a614eac611a54038603df114088ea413770881961a32e1f5fa44d0ed7a9ce5d92913c47c308a1942ec97448556457ad33ad3a43d5ce51e422b5a82e7638e2acfc59d390757ab7c42019d1cdf33b5069bd035c98f14f074625d8f865f0196cf2a2cffca74299e682"], &(0x7f0000000240)=0xd1) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000280)=r1, 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_proto_private(r2, 0x89ec, &(0x7f0000000040)="995b095745b6cc8d030b62646b82ce4a9b3a34c248c8c0a6c6df3d38d993cedc2d2e94f677f3563a11b546eb4bfb") getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x4) syz_open_procfs$namespace(r3, &(0x7f0000000340)='ns/ipc\x00') r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfffffffffffffffd, 0x1000000000001fff) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x8) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f00000000c0)) 00:24:25 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x20040, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x0, 0x100d}}, 0x20) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socket$kcm(0xa, 0x8005, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)=0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x4000080000001, 0x100000001, 0x97, 0x0, 0x400}, 0x98) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x40000000004, 0x201}, 0x2c) accept$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f00000003c0)=0xfffffffffffffc7b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000002c0)={0x2, [0x0, 0x0]}, &(0x7f0000000340)=0xc) connect$llc(r1, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x10000, 0x939, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x5) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r3, &(0x7f0000000100), &(0x7f00000001c0)=""/82}, 0x18) 00:24:25 executing program 6: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) acct(&(0x7f0000000100)='./bus\x00') 00:24:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000740)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstatfs(r0, &(0x7f0000000040)=""/138) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 00:24:25 executing program 6: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000480)={0x90000001}) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x15555555555555fc, 0x4b) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvfrom$llc(r1, &(0x7f0000000140)=""/91, 0xe7, 0x3f, &(0x7f0000000200)={0x1a, 0x203, 0x5, 0xfffffffffffffffc, 0x1, 0x9, @random="4301bbffe0e2"}, 0x10) [ 448.219443] Process accounting resumed 00:24:25 executing program 7: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) sendmsg$alg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="0d06bd245a7f66cd7bf2f9e1ddd080762a1f47f807369732c1846278f2d1d0921176b4e8566fe0e02ed3813e", 0x2c}, {&(0x7f0000000140)="5af17403213b802c0e8d2af21097f4f7e1780f8472d2af03d8b974286c4667a196f36f4b4e2397656d18dc1ef2cf664736acfdd5c1c39fd35c653412e9eb4d63171d081a62f93c5e4d98f8e46c5d88be302f59dbc258c0d0975edd40c93e265648c941c78864d7fdefe0f519f6d6838c755fb5446b8dfcddb60c862ed61b4e55ff2022da98dc020e26dc80b9355fc41d83166d743c275d31285399f0beb668", 0x9f}], 0x2, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @iv={0xc0, 0x117, 0x2, 0xa7, "2d21a0ed179facf37a7df6382410013e688dd57efd6ef0d148be480236daa7582d5e84063ca44f9c582c2be0ebe7e1d74466a0bb8d2cdf4595a0b39d52cec6eb3ad0cb667a3c8cdce567d9765fa127f4116ede5c364d4369b151d4b2941ddc1a8bd3843964ec21979e0ee8f82cb3ede548aaacc3656d80b3964fa4e1c687947b2424d6cc23a45a7b1353ccf3725dfe5f4de74fe0438f7cd76e8298cf650616bfb8bec8a574cb92"}, @op={0x18}], 0x108, 0x80}, 0xc0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {}, {0x0, 0x0, 0x7}}, {{@in6=@mcast2}, 0x0, @in6=@remote, 0x0, 0x3, 0x0, 0x0, 0xc723, 0x3}}, 0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@local}, 0x14) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 448.387393] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.394335] bridge0: port 1(bridge_slave_0) entered disabled state 00:24:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x200, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000004c0)={r2, 0x1, 0x6}, 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x50000, 0x0) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f00000003c0)={0x6400000000000000, 0x1, 0x3f, 0x5, 0x6}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r5 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000340)=0x1e) write$P9_RUNLINKAT(r6, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r6, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r3, 0x0) 00:24:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 448.694409] minix_free_inode: bit 1 already cleared [ 448.731089] minix_free_inode: bit 1 already cleared [ 448.793307] minix_free_inode: bit 1 already cleared 00:24:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e6978ff", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40d, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xea7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x800, 0x40, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x6083, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000200)=""/75) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{0x0, 0x0, 0x81, 0x1}, 0x20}) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700145f8f76") r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) [ 448.849063] minix_free_inode: bit 1 already cleared 00:24:26 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000002a40)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e000000040000009004000050010000500100000000000000000000b0020000c0030000c0030000c0030000c0030000c003000004000000", @ANYPTR=&(0x7f0000001340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x4f0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) lsetxattr(&(0x7f0000002500)='./file0\x00', &(0x7f0000002640)=@random={'btrfs.', 'fdinfo/3\x00'}, &(0x7f0000002680)='IDLETIMER\x00', 0xa, 0x1) finit_module(0xffffffffffffffff, &(0x7f00000029c0)='IDLETIMER\x00', 0x1) readv(r1, &(0x7f0000002440)=[{&(0x7f0000000040)=""/147, 0x93}, {&(0x7f0000000100)=""/65, 0x41}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000240)=""/24, 0x18}, {&(0x7f0000000280)=""/21, 0x15}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f00000013c0)=""/90, 0x5a}, {&(0x7f0000001440)=""/4096, 0x1000}], 0x8) r2 = syz_open_dev$admmidi(&(0x7f0000002580)='/dev/admmidi#\x00', 0x10000, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000025c0), 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000024c0)='net/hci\x00') ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000002600)=0x6) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000b0e000)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000002540)=0xdc, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) 00:24:26 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000080)=[{r0, 0x801c}, {r1, 0x111}, {r1, 0x8}, {r0, 0x4000}, {r1, 0x8}, {r1, 0x4000}], 0x6, 0x9) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x0, 0x200) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10}, 0x10) lseek(r2, 0x0, 0x4) 00:24:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x3, 0x2, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 449.768140] minix_free_inode: bit 1 already cleared [ 449.956716] device team0 left promiscuous mode [ 449.961541] device team_slave_0 left promiscuous mode [ 449.966998] device team_slave_1 left promiscuous mode 00:24:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={0xffffffffffffffff, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 450.142184] minix_free_inode: bit 1 already cleared 00:24:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 450.226389] minix_free_inode: bit 1 already cleared 00:24:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x3, 0x2, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 450.688082] minix_free_inode: bit 1 already cleared [ 450.858925] minix_free_inode: bit 1 already cleared 00:24:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix0', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 451.072997] minix_free_inode: bit 1 already cleared 00:24:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x3, 0x2, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 451.138439] device team0 entered promiscuous mode [ 451.143641] device team_slave_0 entered promiscuous mode [ 451.152125] device team_slave_1 entered promiscuous mode [ 451.194088] 8021q: adding VLAN 0 to HW filter on device team0 [ 451.208268] minix_free_inode: bit 1 already cleared [ 451.229058] device team0 left promiscuous mode [ 451.233937] device team_slave_0 left promiscuous mode [ 451.239354] device team_slave_1 left promiscuous mode 00:24:28 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x3, 0x2, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix#', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 451.996925] minix_free_inode: bit 1 already cleared 00:24:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x400000) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000240), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getlink={0x30, 0x12, 0x201, 0x0, 0x0, {}, [@IFLA_EXT_MASK={0x8}, @IFLA_IF_NETNSID={0x8}]}, 0x30}}, 0x0) 00:24:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:29 executing program 7: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) sendto$unix(r1, &(0x7f0000000100)="e08bb4b7b7272a1ff469e36eca171c7fe33fb55f2db085f05256043f1b58d0accff0a180a57af45454c4bcebed07ac61de440712c2acda3ef192a6d1d672606f44c97329072f75fe35b20a63033d524ff6d7680561ac63aca0f1f69794", 0x5d, 0x1, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) unlink(&(0x7f0000000040)='./file0/file0\x00') 00:24:29 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r0, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r1 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 452.110940] device team0 entered promiscuous mode [ 452.115911] device team_slave_0 entered promiscuous mode [ 452.121574] device team_slave_1 entered promiscuous mode [ 452.128487] 8021q: adding VLAN 0 to HW filter on device team0 [ 452.148472] minix_free_inode: bit 1 already cleared 00:24:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:29 executing program 3: execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000680)=[&(0x7f00000001c0)='/dev/vhost-vsock\x00', &(0x7f0000000200)='keyring.:(.\x00', &(0x7f00000003c0)="76626f786e657430776c616e31fc00", &(0x7f00000005c0)='em0^md5sum::(\x00', &(0x7f0000000600)='/dev/vhost-vsock\x00', &(0x7f0000000640)='[bdevbdev\x00'], &(0x7f0000000880)=[&(0x7f00000006c0)='/dev/vhost-vsock\x00', &(0x7f0000000700)='-\x00', &(0x7f0000000740)='/dev/vhost-vsock\x00', &(0x7f00000007c0)='selinux\x00', &(0x7f0000000800)='/dev/vhost-vsock\x00', &(0x7f0000000840)='\x00']) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000240)=""/213, &(0x7f0000000340)=""/118, &(0x7f00000004c0)=""/165}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000080)=""/115, &(0x7f0000000400)=""/156, &(0x7f0000000940)=""/185}) r1 = syz_open_dev$sndpcmp(&(0x7f00000008c0)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x10801) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/net/pfkey\x00', 0x10040, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000900)=@req3={0x7, 0x80000001, 0x2f, 0x1000, 0x1, 0x1, 0x6}, 0x1c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x7, 0x10000}, &(0x7f0000000a80)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000ac0)={r2, 0x3}, &(0x7f0000000b00)=0x8) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0xfffffffffffffffc) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000100)) 00:24:29 executing program 6: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x6000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000640)={0x7, 0x7, 0xff, 0x3, '\x00', 0x3}) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='9p\x00', 0xfffffffffffffffe, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) umount2(&(0x7f0000000500)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000f4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x480400, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000540)={0x9500000000000000, 0x1000, 0xae, 0x1, 0x13}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000400), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) 00:24:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in={0x2, 0x0, @loopback}], 0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x4) mmap(&(0x7f0000aba000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000)=ANY=[@ANYRES32=0x0, @ANYBLOB="100000008281007051f5e05e71ee63b76f6c3c92"], &(0x7f0000abaffc)=0x18) getpgid(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)="5961ed845a66a60be85b8388873237b4d2fd5d56cd1783b7deddd351b558bfda3200e0a0b4") ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 00:24:29 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 00:24:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101000, 0xc4) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000000c0)) r4 = dup(r2) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000140)={0xff, 0xfff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r5, &(0x7f0000000040)=0x100000, 0x8001) 00:24:29 executing program 3: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x100, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x897b, &(0x7f0000000080)={'veth1_to_team\x00', @ifru_addrs=@xdp={0x2c, 0x4, 0x0, 0x2a}}) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@multicast2, @broadcast, r1}, 0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001540), 0x8) getpgrp(0x0) getegid() getpgrp(0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "3002be2c3f404c9ed0a8aacbac67822feeeea5ef99b4d44719d81bfbb6f262aa"}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000240), 0x4) getresuid(&(0x7f0000005a40), &(0x7f0000005a80), &(0x7f0000005ac0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006500)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000006600)=0xe8) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000280)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 00:24:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='selinux^eth0eth0GPL\x00') connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="b8000000190001000000400000000000ff010000000000000000000000000001e000000100000000000000000000001710ca0f3fdb3d0a5400000000000042d90000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0xf000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x12, &(0x7f0000000200)={@ipv4={[], [], @rand_addr}}, 0x118) 00:24:29 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000000)='./file0/bus\x00', &(0x7f00000000c0)='ra-fs\x00', 0x50, &(0x7f0000000100)) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x401) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x101340, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000200)='./file0\x00', 0x80000002) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0/bus\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x670}}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x4}}]}) [ 452.626123] x86/PAT: syz-executor5:18443 map pfn RAM range req write-combining for [mem 0x189ae0000-0x189ae3fff], got write-back [ 452.690496] Unknown ioctl 1074275334 00:24:29 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x121100, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/autofs\x00', 0xd05812810ed94394, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) process_vm_writev(r3, &(0x7f0000000500)=[{&(0x7f0000000280)=""/70, 0x46}, {&(0x7f0000000300)=""/238, 0xee}, {&(0x7f0000000400)=""/119, 0x77}, {&(0x7f0000000480)=""/78, 0x4e}], 0x4, &(0x7f0000000640)=[{&(0x7f0000000540)=""/1, 0x1}, {&(0x7f0000000580)=""/154, 0x9a}], 0x2, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) bind$unix(r4, &(0x7f0000000680)=@abs={0x1, 0x0, 0x4e24}, 0x6e) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20}}, [0x0, 0x51, 0x40, 0x1, 0x81, 0x1ff, 0x3ff, 0x1, 0x2, 0x9, 0x9, 0x0, 0x1, 0x7fff, 0x5]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000180)={r5, @in={{0x2, 0x4e23, @rand_addr}}}, 0x84) [ 452.715448] x86/PAT: syz-executor5:18450 map pfn RAM range req write-combining for [mem 0x1b2440000-0x1b2443fff], got write-back [ 452.733381] Unknown ioctl 19456 [ 452.740708] Unknown ioctl 1074310803 [ 452.771412] Unknown ioctl 1074275334 [ 452.789342] Unknown ioctl 19456 [ 452.804072] Unknown ioctl 1074310803 00:24:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$vcsa(&(0x7f0000002ff5)='/dev/vcsa#\x00', 0x2, 0x1000001) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}}) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000180), 0x1}], 0x100000000000002f, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 00:24:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x501000) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0xfffffffffffffff9, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 00:24:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101000, 0xc4) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000000c0)) r4 = dup(r2) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000140)={0xff, 0xfff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r5, &(0x7f0000000040)=0x100000, 0x8001) 00:24:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x600000, 0x0) finit_module(r1, &(0x7f0000000040)='\x00', 0x0) [ 453.048580] x86/PAT: syz-executor5:18474 map pfn RAM range req write-combining for [mem 0x189680000-0x189683fff], got write-back [ 453.080599] minix_free_inode: bit 1 already cleared 00:24:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:30 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:30 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/116, 0xfffffffffffffe91) r1 = socket$inet(0x2, 0x8000e, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x2b6d, 0x8, 0x3f, 0x3, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e21, 0x2481, @empty, 0x1}}}, &(0x7f0000000140)=0x84) getdents64(r0, &(0x7f0000000280)=""/66, 0xffffffffffffff64) openat(r0, &(0x7f0000000040)='./file0\x00', 0x240400, 0x3c) 00:24:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) io_setup(0x4bf2, &(0x7f0000000000)=0x0) io_destroy(r1) socket$unix(0x1, 0x5, 0x0) io_setup(0x4a, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0}]) 00:24:30 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x9, 0x204040) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000040)) [ 453.209253] minix_free_inode: bit 1 already cleared [ 453.249452] minix_free_inode: bit 1 already cleared 00:24:30 executing program 0: r0 = socket$rds(0x2, 0x2, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000003000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000008000), 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="580000000000020014033e0f000000000000000000000000", @ANYPTR=&(0x7f0000001000)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000ff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="140000000000000000000000020000000200000000000000000000000000000000000000000000000000000000000000"], 0x42}, 0x0) r1 = memfd_create(&(0x7f0000000040)='^%GPLvboxnet1\x00', 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x9, 0x3fbe, 0x5, 0x53d, 0x97, 0x10000, 0x3, 0x1, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x80000000, 0x5, [0x80, 0xfffffffffffffffa, 0x1, 0x1, 0x8]}, 0xfffffffffffffebd) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 00:24:30 executing program 5: clone(0x101007fc, &(0x7f0000a80000), &(0x7f00007bcffc), &(0x7f000056d000), &(0x7f0000fe1000)) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x5, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x40, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x100, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x640040, 0x0) write$P9_RFLUSH(r2, &(0x7f00000000c0)={0x7, 0x6d, 0x1}, 0x7) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'veth0_to_bond\x00', @dev={[], 0x1e}}) 00:24:30 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x7, 0xa02) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000001c0)=r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x6) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x6800, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x35, r1, 0xa11, 0x0, 0x0, {0x4001}, [{{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}]}, 0x60}}, 0x0) 00:24:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x10001, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 00:24:30 executing program 6: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x8001, 0xf8a2, 0x100000000, 0x8, r0, 0x400}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xb, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/58}, 0x18) [ 453.475002] netlink: 25 bytes leftover after parsing attributes in process `syz-executor7'. 00:24:30 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x5a41, 0x40000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x0, 0x1}, 0x10) semget$private(0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000240)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r2 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r2, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) [ 453.528486] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:24:30 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) clone(0x0, &(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000340)) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r1, r2, 0xe, 0x2}, 0x10) syz_mount_image$jfs(&(0x7f0000000300)='jfs\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x4, 0x2, &(0x7f0000000440)=[{&(0x7f0000000380)="85e3de57a10ea8b8fae0f6ae18065278fd8a4e7df648201b30c37b3babd5d31e29890ca45c99c8f621e5560b8ecfb47968abc10ce37e5e7ef1cdd703a82f041a08a478ad4165292d", 0x48, 0x8}, {&(0x7f0000000400)="2e59045535d7a1ac2c3ed14a597c696f0c4c70", 0x13, 0x5}], 0x80, &(0x7f0000000480)={[{@usrquota='usrquota'}, {@quota='quota'}, {@errors_continue='errors=continue'}, {@noquota='noquota'}]}) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) 00:24:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x9, 0xa, 0x1000000000000008}, 0x2c) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xcc, 0x13, 0x4, 0x0, 0x70bd2d, 0x25dfdbfb, {0x3, 0x0, 0x4}, [@generic="ace0e115d11183e31f6de5a9e42d853dfbf2df9f9f266ca21069dff1a3a27039f6610c14cc2ff1ae38e2aebad281f28a3e3aa7c13df6258aed8ea134bf3019880035eee99ab5c66f5f7b3fa671941c87fa7d5e9099de25ceedcd54988c6cf07e3efbf71ee5e30d108d14aa71fb374c38bb57809b1a91ab4eb3ba555a91083352f7049ddcdb96dc31ac2707eb32e05cf3cf6e1ebd7b77627375cee629b73f0d358f0b53f9f94d9a9ab6fb271bea05239d08e956e0429a96"]}, 0xcc}, 0x1, 0x0, 0x0, 0x8080}, 0x8080) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000002c0), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)='1', &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) fcntl$setpipe(r0, 0x407, 0x3) 00:24:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x20002100008912, &(0x7f00000001c0)="025cc80700145f8f764070") r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8001) fallocate(r1, 0x0, 0x0, 0x3fffffe) pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000001100)='I', 0x1}], 0x1, 0x40000) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="1b", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0x8000) ioctl$fiemap(r1, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000007f0000000000000005000004000000000000000000000000"]) 00:24:30 executing program 6: r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0xfff, 0x101000) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/181) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10810, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x68c617bf, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000080)={0x5, 0x8, 0x8000, {r2, r3+10000000}, 0x40000000000002, 0x39d3800000000000}) dup3(r1, r1, 0x80000) [ 454.157588] minix_free_inode: bit 1 already cleared 00:24:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:31 executing program 6: recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0xffffffffffffffd9, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x5) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000000)) sendfile(r1, r0, &(0x7f0000000040), 0x40800fff) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)={0x56, 0x0, 0x7fff, {0x1ff, 0x2562276a}, {0x5, 0x2}, @const={0x6, {0x1ff, 0x5f11, 0x7, 0x8}}}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0xd2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={r2, 0xe9, "8e622a8e9440cbd505234c9da8404e279e0a1acdec7094151ee1bf0165c88241c3afbf31b1b5766b1eb3f300f6081e8fade950fff5435d781019398d2b6ce8613a2a2f2d77af52020777b006f9e06e2b11d10bd69c6467549dcdcc323e919a3c60c1303c1e0a1b9e9777dcc92a7698446f6d9a65f96275803669fc826330ef3a40d26ceb86ef08ae5b486ca0be66e54ed7e7ae2114eb765cd0b2991362991fad9bcc191613819113badcd191cf72613af1b539cd1edece0d670dafc9d69e089d2be78444cf6bc0ce15bd3ca0c9b2cf1d5c4c9245e87f5e7604c0c13e5e12a7a653bcd3e762f6d96ce6"}, &(0x7f0000000300)=0xf1) 00:24:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00062abd7000fbdbdf250a00000024000200080007007f00000008000300040000000800030007000000080006000000000008000600ff01000008000600010000001c000100080004004e220000080008000000000008000b00736970007fc93fa36832586eda8382723b5f3020cadaa06ffba4f801b6684c2ff4c6d7cae2fadea507c5d42d2cf5d63bb855fe4740517abf41a991ae8c5b1f812ac8abe4674470a0d0"], 0x64}, 0x1, 0x0, 0x0, 0x811}, 0x4004) r4 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0xf401, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 00:24:31 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1b) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/165) 00:24:31 executing program 3: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) r2 = gettid() write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x12400) sched_setattr(0x0, &(0x7f0000000000), 0x0) waitid(0x2, r2, &(0x7f0000000100), 0x4, &(0x7f0000000140)) 00:24:31 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000140)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000100)=r3) r4 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r5, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000040), 0x7}]) setsockopt$inet_dccp_buf(r4, 0x21, 0x80, &(0x7f00000001c0), 0x0) 00:24:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 454.280450] minix_free_inode: bit 1 already cleared [ 454.301419] minix_free_inode: bit 1 already cleared [ 454.350611] Unknown ioctl 1074025677 [ 454.382295] Unknown ioctl 1074025672 00:24:31 executing program 7: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xc6b2, 0x80) fanotify_mark(r0, 0x3, 0x40020020, r1, &(0x7f0000000100)='./file0/../file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x2212f857cc8714f3, &(0x7f000000a000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0) [ 454.420346] Unknown ioctl 1074025677 [ 454.436697] Unknown ioctl 1074025672 00:24:31 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) kcmp(r1, r2, 0x6, r0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x4}, 0x1c) removexattr(&(0x7f0000000240)='./bus\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="ff73782673e8eb04a2d77c4fff01c605e6a7632e6361706162008f0000"]) keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000280)=ANY=[@ANYRESHEX]) fallocate(r3, 0x0, 0x0, 0x1000f4) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000300)) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, &(0x7f0000d83ff8), 0x8000fffffffe) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) readlink(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000400)=""/64, 0x38) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 00:24:31 executing program 7: r0 = socket(0x40000000002, 0x3, 0x40) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000100)=0x80, 0x4) fanotify_init(0x40, 0x800) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x7, &(0x7f0000000600)=[{&(0x7f0000000140)="67613e2081c346ebb5c222acc7a69dfe2dac6c860d88a992897d11685f0207e44ad818cb3a915181578b28846303fe4c3c6476f034de09f2872a66ba9f68aadbe994eb51117ec9503b354f6696d402bce5d001192c1c2007549fdd740d9d2988dd3851876551580203b9b3fd12b74405c7f7e8ae6ebd141288b40964a4e635463ecccaaede00e01b635c3e4a6a23f286d158e3456419954e7cc564d2cb2533a58c8bde30", 0xa4, 0x5}, {&(0x7f0000000080), 0x0, 0x8000}, {&(0x7f0000000200)="81736c0a42edc18eee79f97f6401fca44cf6f68c8cf0565b214f49eb15262843f1c13f55105f6383eb6822bb435e82dce46104292beaa36d5ed9f3e786a619aaa998d5c785289b8c19dec8022077c4e6227eb6f89f94d9da39c48cef5095045270074d8191845e8e84d4f942c2ba5fb6d1a28be532cb1ca48541215c1da69972d0c16cabaa38a6e68034b9fadb603ed31ffbc47999782619ac22fbebff5f4b1a732df2823f371e23400b178d544d4a28d7760013cb5e262b580ea57f87925cdfffb9d2b833e6f5d51253f820a15985e1c4c255b4e192d9515dda7a3279", 0xdd, 0x5}, {&(0x7f0000000300)="e20c400fdd191517063af93a61d0797ce5893ab0288b79d7fedf04ab3d3c9f75a5fbf7ede98914716fc833ce07fd542ec9ca8c8d9d7ac05e29fb533131c842acf81c848631af3378bf7d93cc64537c9d1307e7f398be1359ee7763110eb1179a3e9058c2585ed748e974203b3a9369f0c4d41c569e347a8ae80c097e55afd1a82e50c12ed431ccc0f8fd1b9af8a70c6ccc9dc1918192475e13b97c02d7257667266829d4aa78ad51d7b05aa32d257d22c344ee3fc0df57afbaa9d04215aa8edec56edbd7ac01331c579067c0893bf4f1396df5fa40d008b2b58b82fab6aee5ffaaa654db3894", 0xe6, 0x7d1}, {&(0x7f0000000400)="233a8a721d5a7556f76cdebefcd2f8a05fa668bd400cfc43240e6215b6438e2caf3247765f44b0e919c220ca3c7afd959cecddda8e9c99160186bc3cfcc5a1f1cea7ffb1a1e79bccb674", 0x4a, 0x7f}, {&(0x7f0000000480)="534096021ea6936f3a20fbdfa7428d137fe0c57b19576a454febb0a9b796336184ac576b8a388d9304eeef3e956089eb543d1b83a9455c2df8febcadff7332b196ab44172ef9efe909adca4ba55e351ea71c4f247bb8d61f255e8cb9e7617c2c01457deab402a2713c58e639299f93110b9632846b94d87dc9044dc6fb44a7ece07b599ea85ad0316eb6659460877e5a48b510708d226ded95b93091887583becc847e14ca4b7470ea39cb593aca3175c2f96179b6152e52fd443a3617e5f45ce171f25114703258abb1ddf796713ad7cd81696208e84384597c89e4", 0xdc, 0x80000001}, {&(0x7f0000000580)="5b3d3e670d48a1b37b1160fb1308329c41189d93e39c3bb5975a24b49dd5c3f4dfbb6e0ff971ef790b20f2d6b5a59e717c5020153b2c9da9c5894fce225dfada9320926380b0bc29269d1f6e12ac38d0428818913e422a8fb33b5c81d93dc72ff5180d8ffbfffb11dcc9", 0x6a, 0x9}], 0x82004, &(0x7f00000000c0)={[{@uni_xlate='uni_xlate=1'}, {@shortname_win95='shortname=win95'}, {@utf8='utf8=1'}, {@uni_xlate='uni_xlate=1'}, {@shortname_mixed='shortname=mixed'}]}) sendto$unix(r0, &(0x7f0000000cc0), 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x6e) 00:24:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)="01", 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 00:24:32 executing program 6: r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000953000/0x2000)=nil, 0x2000, 0x4, r0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 00:24:32 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_CLOCK(r2, 0xae71, &(0x7f0000000040)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffffffffffffffe0, 0x0) 00:24:32 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x4001, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)=""/250, 0xfa}], 0x1, &(0x7f0000000500)=""/168, 0xa8, 0x140000}, 0x8}, {{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000040)=""/57, 0x39}, {&(0x7f00000005c0)=""/203, 0xcb}, {&(0x7f00000001c0)=""/36, 0x24}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f00000007c0)}], 0x5, &(0x7f0000000880)=""/80, 0x50, 0x20}, 0x9}, {{&(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000980)=""/191, 0xbf}, {&(0x7f0000000a40)=""/65, 0x41}, {&(0x7f0000000ac0)=""/116, 0x74}, {&(0x7f0000000b40)=""/113, 0x71}, {&(0x7f0000000bc0)=""/209, 0xd1}], 0x5, &(0x7f0000000d40)=""/210, 0xd2, 0x1}, 0x5}, {{&(0x7f0000000e40)=@rc, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000ec0)=""/205, 0xcd}, {&(0x7f0000000fc0)=""/243, 0xf3}, {&(0x7f00000010c0)=""/24, 0x18}, {&(0x7f0000001100)=""/168, 0xa8}, {&(0x7f00000011c0)=""/157, 0x9d}, {&(0x7f0000001280)=""/43, 0x2b}, {&(0x7f00000012c0)=""/224, 0xe0}], 0x7, &(0x7f0000001440)=""/206, 0xce, 0x9}, 0x80000000}, {{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/195, 0xc3}], 0x1, 0x0, 0x0, 0x4}, 0xfffffffffffffffb}], 0x5, 0x10001, &(0x7f0000001840)={0x77359400}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000780)={0x6, 0xff, 0xffffffff, 0x3}, 0x14) syz_init_net_socket$llc(0x1a, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000266ffc)=0x800, 0x4) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/137, 0x89}], 0x1, &(0x7f0000000280)=""/38, 0x26}, 0x0) 00:24:32 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 455.314210] minix_free_inode: bit 1 already cleared [ 455.394308] minix_free_inode: bit 1 already cleared 00:24:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:32 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:32 executing program 6: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000880)=0x1) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000008c0), 0x5ea813bad44acf26) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet(0x2, 0x0, 0x1000) listen(r1, 0xfffffffffffffe14) accept4(r1, &(0x7f0000000340)=@alg, &(0x7f0000000100)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/166) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) wait4(r4, &(0x7f0000000300), 0x2000000a, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="53797a31e301b21fdf67e95ef1c92cd311fae0de93dc298e5229c80138ad3800000000000000009241000000000000"], 0x2f) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x40900, 0x0) ioctl$KVM_SET_GSI_ROUTING(r5, 0x4008ae6a, &(0x7f0000000280)={0x1, 0x0, [{0x1f, 0x3, 0x0, 0x0, @sint={0x7f, 0x7}}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x8, @remote, 0x7}}, 0x0, 0x100}, &(0x7f00000000c0)=0x90) [ 455.490000] minix_free_inode: bit 1 already cleared 00:24:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0xed6480babd87dd0b, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000000, {0x401f0000}}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) 00:24:32 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{r0, 0x6}, {r0}], 0x2, 0x3f) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18, 0xfffffffffffffff5, 0x1, {0x2}}, 0x18) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) r2 = msgget$private(0x0, 0x231) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) msgrcv(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x8b, 0x2, 0x2800) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000002c0)=0x1) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000080)={@mcast2}, &(0x7f00000000c0)=0x14) ioctl$RTC_UIE_OFF(r1, 0x7004) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) 00:24:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) r3 = dup(r1) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x4, &(0x7f0000013ff4)={@local, @rand_addr, @multicast2}, 0xc) getsockopt$inet_int(r4, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) close(r4) dup3(r0, r1, 0x0) 00:24:33 executing program 5: add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140), &(0x7f0000000400), 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x7}, 0x8) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) 00:24:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xff, 0x800) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0xfff, @loopback, 0x800}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x3034, 0x8, 0xd9d, 0x7ff, 0x32}, 0x14) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) fcntl$setstatus(r0, 0x4, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x19) sendfile(r1, r1, 0x0, 0x1000) 00:24:33 executing program 5: setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffff0000000004f60000000000000001000000000000000000000000e0000002e00000010000ffffac14140f"], 0x1) r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) sendto$inet(r0, &(0x7f0000000280)="8e53182bd72617350fc4d5797de98323857d6034a97bbafd618edea7b59f191c42a1398af9887c37724513d0ef078c5aa65c7b60f398769fc680c12b2c7f92d0244209a07a23a864db8f0d36a566572bcc40cfaa4a45f5311917f179838234ed7368f9f058d58f26f0f80d0864", 0x6d, 0x4000000, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) 00:24:33 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) write$9p(r0, &(0x7f0000000040)="45511c3aea091602751b2cc293e08fed1d977c96f6bc32979fe208b47a9ec76d83bdd68f3b6457c5f3e1e2755811e22b2060e2b881e4c4caa6829ecaca57a3a4ba25539f7dfe32a1d13699fc0e", 0x4d) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0x1b, 0x7, 0x2, {{0xe, '{#-^selfmd5sum'}, 0x5}}, 0x1b) r1 = getpgid(0x0) write$P9_RGETLOCK(r0, &(0x7f0000000100)={0x2c, 0x37, 0x1, {0x0, 0x3, 0x9f, r1, 0xe, '{#-^selfmd5sum'}}, 0x2c) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="59c7f5e05c04424d139bfb20ef7e6864", 0x10) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000180)={0x4, 0x5001, 0x1, 0x3, 0x1}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) getpeername$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000340)={@mcast1, 0xe, r2}) pwrite64(r0, &(0x7f0000000380)="b75e679fe8139f73273fb3a1fc6caa7008e2f79c6bbaabc833c37b736adac21593afc9554d392517451357da392fdd16034f21d31cd31d705b53f937b8ae9d22", 0x40, 0x0) r3 = accept4(r0, &(0x7f00000003c0)=@l2, &(0x7f0000000440)=0x80, 0x800) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000540)={0x0, 0x100000000, 0x6}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000005c0)={r4, 0x8, 0x9, 0x4}, 0x10) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000600)={{0x0, 0x0, 0x7, 0x3, 0xce92}}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e20, 0x5c588033, @mcast2, 0x3f}}, 0x100000001, 0x7, 0x8, 0x5, 0x2}, 0x98) write$P9_RGETLOCK(r0, &(0x7f0000000700)={0x29, 0x37, 0x1, {0x0, 0x4, 0x8, r1, 0xb, "252427a66e6f6465765b5e"}}, 0x29) write$P9_RXATTRCREATE(r0, &(0x7f0000000740)={0x7, 0x21, 0x2}, 0x7) ioctl$RTC_AIE_ON(r0, 0x7001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0x50, &(0x7f0000000780)}, 0x10) getsockopt$sock_int(r3, 0x1, 0x2f, &(0x7f0000000840), &(0x7f0000000880)=0x4) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000008c0)) socketpair$inet(0x2, 0x2, 0x6, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r6, 0x0, 0x42, &(0x7f0000000940)={'ah\x00'}, &(0x7f0000000980)=0x1e) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getpeername(r5, &(0x7f0000000a40)=@nfc_llcp, &(0x7f0000000ac0)=0x80) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000b80)) 00:24:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 456.427071] minix_free_inode: bit 1 already cleared 00:24:33 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 456.528330] minix_free_inode: bit 1 already cleared [ 456.533508] minix_free_inode: bit 1 already cleared 00:24:33 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x80010, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) close(r1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2080, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) 00:24:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:33 executing program 6: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000200)='./bus\x00', 0x400, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8)=0x3301c, 0x8000fffffffe) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="480000006658d38c70860bd559cb7dd48611da4139bba9461182f51a2ba4dc911d10067db533621114d8200fead4d98b00c7467bfb368a5c58fc440880cd3105a606706c1902aaf00558234e"], &(0x7f00000003c0)=0x50) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000400)={r2, 0x4}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000440)={r2, 0x2, 0xfffffffffffffffd}, 0x8) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000000c0)={0x40000000000, 0x0, 0x400, 0xfffffffffffffbff, 0xd542, 0x1000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5660, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x9, 0x200, 0x7fff, 0x9, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e24, @local}}, 0x1f, 0x0, 0x2c7, 0x1, 0x40}, &(0x7f0000000380)=0x98) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000200)=ANY=[]) [ 456.660680] minix_free_inode: bit 1 already cleared 00:24:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$vnet(r0, &(0x7f0000000040)={0x1, {&(0x7f0000000580)=""/4096, 0x1000, &(0x7f0000000240)=""/205, 0x3}}, 0x68) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000440)=0x4) socketpair(0x3, 0x0, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x38) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000140)=0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000001740)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001700)={&(0x7f0000000500)={0x34, r4, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2b}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}]}, 0x34}, 0x1, 0x0, 0x0, 0x40004}, 0x4010) munlock(&(0x7f0000003000/0x3000)=nil, 0x3000) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000380)=""/170) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x1012, r5, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) io_submit(r3, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0xff870000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:24:34 executing program 0: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000200)={0x1, 0x3c, &(0x7f0000000180)="5e4b199c7f5cba5bfd68233c19ab9999adedd40a87a4bd9a0c35cbb0e0ae3ba8bba0fd97863a4da683f3248d39fdbd767dcf5bc8dc4c118fbe11fdbb"}) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) getrandom(&(0x7f0000000040)=""/213, 0xd5, 0x0) 00:24:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 456.978304] minix_free_inode: bit 1 already cleared 00:24:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a", 0x4) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80000001, 0x400200) close(r0) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x6, 0xa0, 0x7, 0xffff, 0x0, 0x4}}, 0x8) 00:24:34 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0x8}, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setuid(0x0) sendmmsg(r2, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x340, &(0x7f0000005b00)}}, {{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000005c40), 0x1f4, &(0x7f0000005c80), 0x3a00}}], 0x38c, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000140)={{0x5, 0x3000000000000000}, 'port1\x00', 0x10, 0x90020, 0x6, 0x1, 0x0, 0x9, 0x4, 0x0, 0x6, 0xffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000007780)=[{{0x0, 0xffffffffffffff16, &(0x7f0000000200), 0x0, &(0x7f0000000240)}}, {{&(0x7f0000006cc0)=@nfc={0x1e}, 0x80, &(0x7f0000007080), 0x25c, &(0x7f0000009d00)}}], 0x2, 0x0) 00:24:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 457.370835] minix_free_inode: bit 1 already cleared 00:24:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000005, 0xce1) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='}\x00', 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x6, 0x0, 0x1, r2}) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r1, &(0x7f00002e4000)="2e2f66696c65ffff", &(0x7f0000000000)=ANY=[], &(0x7f0000001ffc), 0x1400) [ 457.449764] syz-executor3 (18753) used greatest stack depth: 12248 bytes left 00:24:34 executing program 3: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="232196db00000000000000000000007ec0ddb91aa093acade1d6b1db5f63eb2fb949e4557bb18ad452ed27d57c335c192f1c"], 0xf) close(r1) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x100000001, 0x0, 0x80a0, 0xfffffffffffffff9, 0x6c4}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x2f}, &(0x7f0000000580)=0x8) userfaultfd(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x106, 0x3}}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x1000, 0xfc, &(0x7f0000001180)="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", &(0x7f0000000340)=""/252, 0x81}, 0x28) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYBLOB="07000000ba9db3e4ee699a71566fde75c72871010df305083c08a582e71bfd4c7a0ae3280a5e65444e973bd31aa2fc4ee293f9e95ad5c3c88e129091e39faf052a7e1409be05f637386177ab4b017f63886c94f1cee23b2e59241d22f6966961bae90000000000000000"], &(0x7f0000000280)=0x1) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) unlink(&(0x7f0000000200)='./control/file0\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) close(0xffffffffffffffff) 00:24:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) ioctl(r0, 0x4, &(0x7f0000000280)="01060000003100337e3b85") r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r3, 0x29, 0x3e, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 00:24:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 457.623441] minix_free_inode: bit 1 already cleared [ 457.635278] minix_free_inode: bit 1 already cleared 00:24:34 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:34 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000001c0)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x28, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ff9000/0x6000)=nil, 0x6000}, 0x1}) ioctl(r0, 0xffffffff, &(0x7f00000000c0)="14e9675e6ee0c9ce1f861b51010d94dd3f6c8067471509a1243e9d087c018acfd7e41d90040da7f74c9c171515adf37f1176c112bd4bf0ff665b1ba2abd8579045bb33b79d8b523a60c17d07c57f736c42838b3cbbeeca5f1b85b5cf9ca066639259de7362b52237f257d8ad144c325d8214d58f6ae67ad1d5b0d6e6ddebfb02727f9d0e10c121624085698ce313f7ac1b976b60a7de02459f7b9a15246fc9e2b5a2f6d9b8151ba41b73a3a5015bd3c1f4b1b96104afa1450b030b7e0a7db3648be6342948f013e0ea2353180c1c73d291301bb149a8869b97db37bbcace6ffdefd47389d1733e8966bf0972") setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x4, 0x4) ioctl$TCSBRK(r2, 0x5409, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000002c0)={0x6, &(0x7f0000000280)=[{0x8d24, 0x0, 0x76, 0x7}, {0x3, 0x5, 0x1ff, 0x20}, {0x59b3a00000000000, 0x5, 0x0, 0x9}, {0x8000, 0x0, 0x1, 0x3}, {0x8, 0x1, 0x2}, {0x80000001, 0x9000, 0xffffffffffffffff, 0x9}]}, 0x10) [ 457.760091] minix_free_inode: bit 1 already cleared 00:24:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:35 executing program 6: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @local}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, &(0x7f0000000000)=0x100) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = getpgid(0xffffffffffffffff) sched_getattr(r1, &(0x7f0000000200), 0x30, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 00:24:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x13) r1 = socket$inet6(0xa, 0x8080f, 0x3a) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x201}}}}}]}, 0x48}}, 0x0) [ 457.911638] minix_free_inode: bit 1 already cleared [ 457.925332] minix_free_inode: bit 1 already cleared 00:24:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x8000000002, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c65300a1cbe"], 0xd) r1 = syz_open_pts(r0, 0x0) r2 = socket(0x19, 0x5, 0x9) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r3, 0x92d, 0x30}, 0xc) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa92, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f00000000c0)={0x81, 0x0, 0x0, 0x0, 0x0, 0x20000000000001, 0x0, 0x0, 0xf78, 0x2}) 00:24:35 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, &(0x7f00000010c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000001200)) syz_extract_tcp_res(&(0x7f0000000040), 0x8000, 0x1) waitid(0x0, 0x0, 0x0, 0x41000004, &(0x7f0000000180)) 00:24:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e21, 0x1, @mcast2, 0x5}}, 0x0, 0x3}, &(0x7f00000002c0)=0x90) ftruncate(r0, 0x400000008200) seccomp(0x1, 0x1, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x40, 0x8, 0x1, 0x1}, {0x0, 0xfffffffffffffff7, 0x0, 0x1}]}) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)='\n\\') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd) r3 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x60) openat$cgroup_ro(r2, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) r4 = request_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000380)='\x00', 0x0) r5 = add_key(&(0x7f0000000440)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000004c0)="13ae0f32678ba2e29a885cd22a23a0b647bb", 0x202, 0xffffffffffffffff) execve(&(0x7f0000000500)='./bus\x00', &(0x7f00000005c0)=[&(0x7f0000000540)='/ppp1GPL{].trusted\']security^-]trustedmd5sum$^cgroupeth0\x00', &(0x7f0000000580)='trusted\x00'], &(0x7f0000000680)=[&(0x7f0000000600)='trusted\x00', &(0x7f0000000640)='\x00']) keyctl$search(0xa, r4, &(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, r5) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendmmsg(r6, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 00:24:35 executing program 3: linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1400) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x17ff0d76, 0x1) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x8}, 0x2) 00:24:35 executing program 5: clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) nanosleep(&(0x7f00000004c0)={r0, r1+10000000}, &(0x7f0000000500)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x2, &(0x7f0000000400)=[{&(0x7f00000002c0), 0x0, 0x40}, {&(0x7f0000000300)="9bcf9efddcc38b53d83760aa3ecdff6413cb4e9809ccef8787a58b710136965b71e06467aa62ac020808b77d279205676c3774485eaddc0cce3b2b31ea1e6982079df342790f83230a80d4ec915f0a7b8c132e67d0f4de0ebe0fe51d9ee601d07d83e84557cd7f2633833429bfcb8a6b7f5d0e563d8acbeab584930318735368148db624cf36ffce83a55c7c4fbef8c24a39301ebaada242cd970eb83ea1e6859cddf81a44406cf82c581ce734840159ddd72f3aa44c63d745e42de87f7a5e6f25ebc5d1e53523997632fa20f6adea4083db526768728ab51985dfe1fe964b3b0f19b456a9e7fe", 0xe7, 0x5}], 0x1000, &(0x7f0000000540)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030352c636f6d6d69743d3078303030303030306b2d616c6c6f6361746f723d74657374342c67727071756f74612c646174613d77726974656261636b2c7573726a71756f74613d73797a2c007f07b084faf4818963442beff15f082e2e2fa5d58735d85162422a725e67b5e215759edea7c46292b9e7"]) openat$userio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/userio\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:24:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000000)=[{{&(0x7f00000056c0)=@l2={0x1f, 0x5, {0x7f, 0x9, 0x3f, 0x2ae, 0xffffffffffff7fff, 0x6}, 0x4, 0x5}, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0) 00:24:35 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0x49, 0x29, 0x1, {0x0, [{{}, 0x0, 0x1, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x49) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, r2}}, {@cache_none='cache=none'}, {@debug={'debug', 0x3d, 0xf9}}, {@cache_none='cache=none'}, {@cache_mmap='cache=mmap'}, {@version_L='version=9p2000.L'}]}}) 00:24:35 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 458.767437] minix_free_inode: bit 1 already cleared 00:24:35 executing program 3: r0 = socket(0x10, 0x2, 0x0) ioctl$void(r0, 0x5450) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=@ipv6_delrule={0x34, 0x21, 0x11, 0x0, 0x0, {0xa, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_SRC={0x14, 0x2, @ipv4={[], [], @loopback}}]}, 0x34}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0xa02, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x6, 0x7, 0xd, 0xd, 0x0, 0x70bd28, 0x25dfdbfb, [@sadb_address={0x5, 0x7, 0xff, 0x80, 0x0, @in6={0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x1b}, 0x4}}, @sadb_lifetime={0x4, 0x7, 0x1, 0x1f, 0x4, 0xd078}, @sadb_ident={0x2, 0xa, 0x6, 0x0, 0x80000}]}, 0x68}}, 0x0) 00:24:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000240)={0x5, 0x100000001, 0xfff}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000380)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x34000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000340)) close(r0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x301400, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f00000000c0)={{0x1, 0x2, 0x7fff, 0x1}, 0xffffffff, 0x40}) keyctl$join(0x1, &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}) 00:24:36 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7859, 0x10002) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0x2f, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e21, 0x2, 'lc\x00', 0x8, 0x3, 0x9}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x20fff2}) fcntl$setsig(r1, 0xa, 0x7) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x1011fc, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000200)={0x1, 0x10001}, 0x2) r3 = gettid() r4 = memfd_create(&(0x7f0000000280)='bdev]vmnet1\x00', 0x0) write$FUSE_ATTR(r4, &(0x7f0000000180)={0x78}, 0x78) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000240)={0x7, 0x8000}) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x4000000016) connect$llc(r2, &(0x7f0000000040)={0x1a, 0x323, 0x0, 0x0, 0x1, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) [ 458.904137] minix_free_inode: bit 1 already cleared 00:24:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:36 executing program 3: r0 = socket(0x11, 0x80002, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) getpeername$packet(r0, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002cc0)=0x14) [ 459.060346] minix_free_inode: bit 1 already cleared 00:24:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix.', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 459.160222] minix_free_inode: bit 1 already cleared 00:24:36 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1402) r1 = memfd_create(&(0x7f0000000a40)='/dev/loop#\x00', 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x2c69, 0x20}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x4}, 0xfffffffffffffcf0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000880)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0xa, &(0x7f0000000780)=[{&(0x7f0000000200)="a749c4d479f68da0f2eae62d0fdfa26d8241e63f1df2d6ded665e3c2ab44ee16a1", 0x21, 0x9}, {&(0x7f0000000240)="277c86b5bc2f37260b859a2113b0013486a4e1dc49c0184753c07e46005d1dc54a7d5c64bfe0cb26bf4222d02f8384445506d1e63c527c020342c077f2c883f231627126707d68edc5a51cb6ee33018948f493236c27121ea03547609f489e06b4b4a6", 0x63, 0x81}, {&(0x7f00000002c0)="e15e025970250f35a1726122d1844901cad3783155d28d7f53682988140df41389a057a563b03c576f0ac177a74ffa8e1d1dc5fbce82edb180dd121867c3e36bb6ca25d6bde047d9d45403dc34b58b7978e790efadf71fbb89d43eb89143a1ace79a446fcf0412badd5759ff48f92f38493ca4b811fef903d227649ead6a9029b887b145af57b1b041cba0ff", 0x8c, 0x10000}, {&(0x7f0000000380)="f68b5839b6e4d8dfe85f35b3742f1356d067", 0x12}, {&(0x7f00000003c0)="f347880a9ec713fd361f1dc391de311f4b0c92ebbe83805c4aa5c4371a195d3b87bb5eebaaf945e7d8a7976179e1c096d47ffd010d8b208f7af84a2cd3c514b0fd81f9c245d8b1732ce7932b096ad56c2fde24b46b85c6806f4557", 0x5b, 0x9}, {&(0x7f0000000440)="9c3f832108dc01a7f118b6169e9abaadbcfc545c229e733a1293175c048ced1d5551d89cc9338f056f33fd57e37b453a7d84950f9007984c4139876c5138584c683d1f0cf0a76c287ae401c337082ea2f6789603355de15fd003ab35864a2c07", 0x60, 0x9}, {&(0x7f00000004c0)="49cf4390b104381fc0fa6cb978d8e8168181cac0371aa68d13a1938929e09318d48ed381f014ab7af2411ab36a56414a672ac3537278eaade47d28464694ebed1d241f5dbede29bb739a65a0ff1ec17cd2ccf9ac495ea87752c794d16665b510214e358bf147fabccabec9a19e089dcf24bd3d8a590cbed0d7374192937a5fef480c00ad075b0bec1f3597a20c73460d37170ec4dceb22b1282dad242412894b10fdcba9175fd03f17f4826c6e07a64d320778d7550892a09dfd6d34ee1cdf14", 0xc0, 0x3}, {&(0x7f0000000580)="c5f15293390c400c9d537b8398929f2569021c7b81de24ddad96bb4df344177008443cbf49f51f7d0f49189238b08573245ad9b3ecf7436a7b67b3b4ec4f57145f0f5e3afccc1fcd265d24f90b9b00bbc6afc60ff5fad6969de3e4036e7c41142cbff5d684ff40f4056ad5b5d5ad56441888afa8cd932b51e631f85f4a7edc46b7a33f271fd52ee0d85bbc2136d93b153728036d", 0x94, 0x3}, {&(0x7f0000000640)="8ed1c5fc7f70c24725bd58bd89ed16fac079ffe5cdbde7fa6abaf161eff241afc6b01677403de59eb8366df407c28db6bfafd937b067a266df67bea241d38643435735d256bb1c42fc35bf99e3a893e596b6c203c431bc0bc7d2526e16674d8d25d99fda5137c828741cfa6e41793d6f8fc821d80cc9a975ef", 0x79, 0x8}, {&(0x7f00000006c0)="11806317c39c0afad631faa03649aaa42e0600a4724830c8baa5d8fecd17285a11f109abeec6230ddf0795af40536508efa1c54704ab5ba04c2db48cd469e800b562932d09f3e4370cea44948a09679d3630253df6e9924d850b5e13a40c319b72925099d7708d4c472ba520639761afc890c962f6b46390e4aaf9bd4ba4e6a1222b00b2e7de7334f72370264276d25144fb5992fc1725fdd5e9b947829d1d06eb8993fbeffa7937da3b846d5cb7313ca8da890388ef2bebca1ce17db3", 0xbd, 0x9}], 0x2004, &(0x7f00000009c0)={[{@uid={'uid', 0x3d, r3}}]}) setns(r1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 00:24:36 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x1, 0x0) execveat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000700)=[&(0x7f0000000540)='(wlan1Fvmnet0-#\x00', &(0x7f0000000580)='rodir', &(0x7f00000005c0)='vfat\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='\x00', &(0x7f00000006c0)='trusted[\x00'], &(0x7f0000000780)=[&(0x7f0000000740)='::+\x00'], 0x100) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000400)='vfat\x00', &(0x7f0000000440)='./file0\x00', 0x28e, 0x0, &(0x7f0000000700), 0x135180, &(0x7f0000000480)={[{@rodir='rodir'}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="f77cfd3d5d35f7347aff0dd55cfc1cdbc0c0e53bbf372db027f77c77f70c5c4269f83e5b2d5bc917b45abc7449d00fd3843189eb6e1f433e9a72a15c381bc9af3e85d2ceff1ce22e7773338dfac005dc24c77ffcd3f04b4f5656e4736e5d6c4f53f0b6691528f22aed78536255754897a8dd2d40b7053ae8eb309481a2640944c9ef0997db81c61ce76001fe058f19673e77be", 0x93, 0x5}, {&(0x7f0000000140)="133e39d82ea69550f8f51091c212e5b88cc0bb3d8f7928c607ca310acddff3ee8ede4338ff4057c51c4ad5592e8c59ba255dbe606d71577c6a317f5fe6be7c640d7a90c26cbe", 0x46, 0xffffffffffffbe45}, {&(0x7f00000001c0)="1c5077e38d34a0995b389fcb7e54241f51dbd3b56403c616b8c5d604dda19a27e1773118af3935ccb9faaea498f9dfce055b424c43dd57291a764b41a20bc98e364ec244a8bbcf7ca720ba8d776c4281bf98c9a5ca", 0x55, 0x8001}, {&(0x7f0000000240)="426ec6a0d1036b2886cee5d90df1c45f2fd1917f8c0dfe34a661ac1ea98ee0d9a29dc2f0815726b5e508875980744d1ca7c9241665188fac8f2f71998896a5e11c5e13dcd6de6579c080d1e121a7545a30d2363d4d1d1b0604586f97159d01762d8263b14fec395cf9e300cfa11b53858a547d75b7efff1ac07a51c9928114d74859e8645b3f1277965bfee140b21a9c53aebadf795908ce2ffa578bea31985520df3e82bd079e73d1deb2eea0b1201b279e745f4fb0708d9fb6d1cce8fa19e5798262385000daf538e477e29f21069d59a1c78c47588b6596de78e73f67a57dbbd1ad5809b99728ef13202a6000414ac782fc", 0xf3, 0x2}], 0x40, &(0x7f00000003c0)) socket$vsock_stream(0x28, 0x1, 0x0) 00:24:36 executing program 7: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e22, 0xfff, @dev={0xfe, 0x80, [], 0x13}, 0x3e63bb44}}, 0x9, 0xfffffffffffffffb}, 0x90) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1, 0x6e2}, 0x8) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/11, 0xb}, {&(0x7f0000000300)=""/128, 0x80}, {&(0x7f0000000380)=""/250, 0xfa}], 0x4) r2 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x12, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000004c0)={r2}) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000500)) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) modify_ldt$read(0x0, &(0x7f0000000540)=""/65, 0x41) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000005c0)) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000600)={0x8, 0x3a0, 0x5, 0x0, 0x0, [{r0, 0x0, 0xff}, {r0, 0x0, 0x5}, {r0, 0x0, 0xff}, {r0, 0x0, 0x5}, {r0, 0x0, 0x6}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000006c0)=0x3, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000700)={r1, @in={{0x2, 0x4e22, @loopback}}, 0x9, 0x8001}, 0x90) sendfile(r0, r0, &(0x7f00000007c0), 0x9) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000800)=0xffffffffffff3d5c, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000840)={r1, 0x3}, 0x8) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000880)) ioctl$RTC_PIE_OFF(r0, 0x7006) write$P9_RAUTH(r0, &(0x7f00000008c0)={0x14, 0x67, 0x1, {0x8, 0x3, 0x7}}, 0x14) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000900)={0x7, 0x20, 0x0, r0}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000940)={'sit0\x00', {0x2, 0x4e21, @broadcast}}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000980)={r0}) getpeername$netlink(r0, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000a40)=0xffffffffffffff7f, 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000a80)={0xd000, 0x1000}) r3 = shmget$private(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) 00:24:36 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f00000001c0)="dbb494010001000000000099d3", &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000540), 0x820, &(0x7f0000000240)) 00:24:36 executing program 0: getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x10}, &(0x7f00000001c0)=0xc) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x20, 0x30000) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85715070") sendto$inet6(r0, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) accept4$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in6=@remote, 0x4e24, 0x0, 0x4e24, 0x4, 0xa, 0x0, 0x20, 0x0, r3, r4}, {0x7fffffff, 0x0, 0x9, 0x0, 0x10001, 0x0, 0x7ff, 0x100000001}, {0x3ff800000, 0x80, 0x5, 0x7}, 0x5, 0x6e6bbe, 0x3, 0x0, 0x2, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0xb}, 0x4d3, 0x33}, 0xa, @in=@multicast1, 0x3503, 0x1, 0x2, 0x9, 0x0, 0xbd}}, 0xe8) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140), 0x1, &(0x7f0000001500), 0x11e0}}], 0x1, 0x0) 00:24:36 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x800, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r3, 0x28, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0xfffffffffffffd15) accept(r1, 0x0, &(0x7f0000000140)) 00:24:36 executing program 3: socket$inet6(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r2, r3, &(0x7f00000002c0), 0x80008) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) socket$inet6_sctp(0xa, 0x3, 0x84) 00:24:36 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x5) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9700, 0xa000) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)={0x0, 0xdb, 0x1}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) close(r0) 00:24:36 executing program 5: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000200)=0x1e) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/239) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x6, 0x3, 0x2, 0xf}, 0xffffffffffffff80) 00:24:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:37 executing program 6: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000409000/0x3000)=nil, 0x3000, 0xe) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10001, 0x80000) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x36) 00:24:37 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2100, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000001c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt(r2, 0x400, 0x6, &(0x7f00000000c0)="ef52319ed569dc49cb2b07f5da237430f5cdb3965161a0d993e54295d0482e2544c5d209f34cb3c0c20542ec60478a0efdfe1bfd7d34ba5ba2fe069ee2e2401fbcf65254ac2cc67afdf54a7b364c9ce2ae7baa9f90e08638f44239bc60f32a4f486551bbc97319bf7b63600f87bfd82ea3a808477dd070a11d84a8d86fb94e4043309f130f7aca223367f52c0ea344cb36e58ffae9b3a42a0543830eb576f85bffe185f3e13cc100679a75c523d29c98ba702fae5a141229ee924dc761f8d9c7e03ddd7110cd7ab0a418713e0ecd1171f86d92a0d001147c3081b0184200da16b58a41dfee", 0xe5) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{&(0x7f00000053c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000005800)=[{&(0x7f0000005740)=""/49, 0x31}, {&(0x7f0000005780)=""/76, 0x4c}], 0x2, &(0x7f0000005880)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006c40)={0x77359400}) sendto$inet6(r2, &(0x7f0000000080)='g', 0x1, 0x0, &(0x7f0000000340)={0xa, 0x10000000004ea3, 0x0, @dev={0xfe, 0x80, [], 0x15}}, 0x1c) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/133}, {&(0x7f0000000380)=""/207}, {&(0x7f00000002c0)=""/28}, {&(0x7f0000000480)=""/156}, {&(0x7f0000000300)=""/6}, {&(0x7f0000000540)=""/69}]}}, {{&(0x7f0000000640)=@rc, 0x1f6, &(0x7f0000000800)=[{&(0x7f00000006c0)=""/230}, {&(0x7f00000007c0)=""/59}]}}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000840)}], 0x0, &(0x7f00000008c0)=""/220}}], 0x28c, 0x40000162, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vga_arbiter\x00', 0x10d00, 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x2) 00:24:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix.', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 459.921124] minix_free_inode: bit 1 already cleared 00:24:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000040)={@rand_addr=0x7, @rand_addr=0x80000000, @dev={0xac, 0x14, 0x14, 0x10}}, 0xc) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000001c0)=0x0) getpgid(r3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000100)={0x3, 0x1, 'client1\x00', 0x0, "5aa518494aad6bd0", "222836fe10e09698f248388a5fe31646fee9a88730fcd5314f58143c1b6de49d", 0x7}) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) connect$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x749b, 0x6, @broadcast}, 0x14) close(r1) 00:24:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:37 executing program 7: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x6a18}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x100000000, 0x0, 0x7, 0x9, 0x5}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e21, 0x6671e266, @dev={0xfe, 0x80, [], 0x10}, 0x8}}, 0x1, 0x16}, &(0x7f0000000480)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r3, 0x8001, 0x0, 0xf90, 0x3f}, &(0x7f0000000200)=0x18) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="014d06cb8916471a1fd2e30c08004500001c000000000011907840000000e000000140004e2100089078"], 0x0) 00:24:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) r2 = dup3(r0, r1, 0x4324c01f528a7f3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x5, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000180)={r3, 0xffffffff, 0x20, 0x2, 0x8}, &(0x7f0000000240)=0x18) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="bad004b8c0abef2e360f0966b9cc0a00000f3266b8010000000f01c12e0f22420fc7a814590fc72d650f00d1670fae0af30f209c", 0x34}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000006c0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:24:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)='cpuset\x00', 0xfffffffffffffffd) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x403ff, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x4) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140)='em1em1ppp1-\x00', r2) sendmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}, 0x4f1}], 0x2, 0x0) 00:24:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix.', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 460.145106] minix_free_inode: bit 1 already cleared [ 460.185877] device lo left promiscuous mode 00:24:37 executing program 7: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0xc0000, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x0, 0x6, 0x9, 0x3, 0x4, 0x0, 0x4, 0xe315, 0x1, 0x6, 0x9, 0x537}) ioctl$BLKBSZSET(r0, 0x1261, &(0x7f0000000040)) ioctl$FICLONE(r0, 0x40049409, r0) r2 = syz_open_dev$dspn(&(0x7f00000010c0)='/dev/dsp#\x00', 0x6, 0x30100) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000001240)={0x4, 0x5, 0x8, 0x0, &(0x7f0000001100)=[{}, {}, {}, {}, {}]}) ioctl$TCSBRK(r2, 0x5409, 0xfffffffffffffffe) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x39, 0x0) getcwd(&(0x7f00000032c0)=""/4096, 0x1000) socket$rds(0x15, 0x5, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCSTI(r2, 0x5412, 0x6) 00:24:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix.', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 460.335539] kvm: pic: non byte write [ 460.372998] kvm: pic: non byte write [ 460.393924] kvm: pic: non byte write [ 460.417653] kvm: pic: non byte write [ 460.439555] kvm: pic: non byte write [ 460.475074] kvm: pic: non byte write [ 460.493347] kvm: pic: non byte write 00:24:37 executing program 7: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r1, &(0x7f0000000000)=@vsock, &(0x7f0000000080)=0x80) [ 460.538765] kvm: pic: non byte write [ 460.591193] kvm: pic: non byte write 00:24:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r1 = userfaultfd(0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x1, 0x7, [0x3, 0x7, 0xfffffffffffffffa, 0x0, 0x7fff, 0x7, 0xfc7]}, &(0x7f0000000140)=0x16) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r2, 0xff}, &(0x7f00000001c0)=0xc) close(r1) r3 = creat(&(0x7f0000000100)='./control/file0\x00', 0x10) fcntl$setlease(r3, 0x400, 0x0) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') close(r1) [ 460.615281] kvm: pic: non byte write 00:24:37 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x180) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000180)=@buf={0xcb, &(0x7f0000000080)="0c6c4dad8a5b2aeace4df667e4bdf077b0bda10274c47e1f6d1c46ebac56f0f6d09e50de36c7ebf59f9822594950893d14e91c7e4423c5a0c554fe5980cb28028653bc1ce5933d88c9602e68593d17f93ec45c87019e4b4f453dfc947931f9eec5c14d120ad3d4f002b18c9b4016127bb75cbf3dbd9f09a07dc08d54d5a898e712c353c014dbd9d85310f43a1956c7f9206ede5348eb6aea196aaf23ee03c9d127322e22f733483d32c7dfc1282683b92a9f940f55711f9b58ae8f1102d45b4a550fed3e469cf5dc31ed59"}) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 00:24:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 460.918260] minix_free_inode: bit 1 already cleared 00:24:38 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 461.120184] minix_free_inode: bit 1 already cleared 00:24:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 461.186502] minix_free_inode: bit 1 already cleared [ 461.270351] device lo entered promiscuous mode 00:24:38 executing program 6: r0 = memfd_create(&(0x7f0000000080)="5bd295e7a5c45ebd0000", 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="08010000000000000000000000416804f000000c2800000000000009"], 0x1c) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000003c0), &(0x7f00000005c0), 0x1000) [ 461.585654] device lo left promiscuous mode [ 461.771395] minix_free_inode: bit 1 already cleared [ 461.981278] minix_free_inode: bit 1 already cleared [ 462.075120] minix_free_inode: bit 1 already cleared 00:24:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x5, &(0x7f00000000c0)=0x3, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x5b, "bdd476f9630b0627f1eafa94512535caa1d238e13e98d8c964f689fb2c8c4d334506968772a6ddae8a0dbef8eb1f0f6c38f17d91da2e5fc34c4678157dff784f9bcce0ab2598ef212998a0f5ca4e342aefd2c2cc8e0785410c58e5"}, &(0x7f0000000040)=0x63) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000180)={r3, 0xf93, 0xd2, "d73f367cbe09bcfe57520513a67fbd006ac8c36efbba86f792d7c889569e3a52c6136c044fc228e8b59b0cd85e98d7f797ccd0e93b019148edd0be9f88fd770c3fe8937119e3c5a55de8da33fcf0c1426914d8c8f257d76cebea435556a1dca22a5fd6a72058d1fed7b1e3f8829dd1841a07659b9a9c1e873064f59bd94029218e3e3843e3cfc0298e2353f01bd1e81139b3b794207426a561923fca61b10e6232eb8bb2b07b7b05a0d9deac799dea12228769870172b96c80c8ddd3e8500951e0b65c723d66434a6cd07dd35815105195da"}, 0xda) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) 00:24:39 executing program 7: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) inotify_init() syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000780)) perf_event_open(&(0x7f0000000040)={0x4001, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x213a, 0x7, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback, 0x5}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x200000, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x39, "c0bb8f112c48ab20a3e76d0e7be59c7baca6ad4021f84ca6d662c3ae763f780c"}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000380), 0xc, &(0x7f0000000940)={&(0x7f0000000480)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./control\x00', 0x0, 0x20) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f00000003c0)={0x40, 0x100000001, 0x9}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'team0\x00', @ifru_addrs=@nfc={0x27, 0x0, 0x2, 0x6}}) umount2(&(0x7f0000000340)='./file0\x00', 0x400000000000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="ad000000", @ANYRES16=r2, @ANYBLOB="010029bd7000fedbdf25050000003400020008000500a95300000800080008000000080006003f26000008000b000a00000008000b000a000000080002004e2400000c0002000800030003000000340003000800040008000000080007004e21000008000500ffffffff080003000000000008000500ac1414aa080003000200000008000400ffff00000c00010008000b00736970000800060000000000"], 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x8000) getpgid(0x0) 00:24:39 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@rand_addr, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x20}, 0x48, r1}) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r2, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}}, 0x14}}, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000280)) 00:24:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={0xffffffffffffffff, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r2 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:39 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0x0, 0x3, 0x6}, 0x76ab, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) keyctl$session_to_parent(0x12) socket$vsock_dgram(0x28, 0x2, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x7c, r2, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x26}}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000), &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x7, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000001700)=0x2, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000040)={r1, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x24, r6, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004045}, 0x4004000) sendmsg$nl_generic(r5, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000001500)=ANY=[@ANYBLOB="1400415d0d8400000000000000000000000000006d7028e8034258b25df1e9777d376ff6da4488ad52e91ba240b8df49c43e0879ea918045ac567dd5071231721f5c38962cb8ebd01e658f6e8a45ed6181e8507254dc604e"], 0x14}}, 0x40000) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40)}, 0x0) [ 462.224879] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:39 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x4, 0x8000) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$sock_proto_private(r0, 0x89ef, &(0x7f0000000280)="ecae19001d0c2923ab89a80df4dcaf17a99420603e8726e9cad02295caa2558232aa0021320741ecdeffb4eb7edb3827ebb9bc4feba651dd927de23b0a485fe7779b2591eb56ada2202cdb16edc727f20c100b9596fec9b02b424160e2ef7865ccad811f1d9a160f5823cc0b91c23c04d4aa0b95414b07456d80924b36f86ceceb3e59c311d604e468ccf4105aa3a8aef728d10846d69fb1b020070451638548b42144afc8b726101a36609d400864775d370295baa07f176eec7d2e387a61550c2c61d0cd0ac6dbc7b03ce80d45a4f334e133c61ae62c5a8147c6a7544428073bc2c3bf") ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000400)={0x97, {0x2, 0x4e23, @local}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @local}, 0x104, 0x1, 0x1, 0x9, 0x7, &(0x7f00000003c0)='nr0\x00', 0x6, 0x6, 0x400}) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{r0}, {r1, 0x100}, {r2, 0x400}, {r3, 0x41}, {r4, 0x8011}], 0x5, &(0x7f0000000200)={r5, r6+30000000}, &(0x7f0000000240)={0x3}, 0x8) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000380)={0x5, @random="8f06b9729f4d"}) open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040)=0x4001, 0x31) ioctl(0xffffffffffffffff, 0x6, &(0x7f00000001c0)="0a5cc80700315f85715070443239bf8239c8d7e30b189aa10aa0e6240b1642e63bc66c6411e59f18") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)=ANY=[]) dup2(r2, r1) [ 462.295086] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:24:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0x4070aea0, 0x0) [ 462.509529] jfs: Unrecognized mount option "/dev/admmidi#" or missing value 00:24:39 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x5, 0x4000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000004}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x10c, r1, 0x201, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3a80000000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x28ba}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x19}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0xf}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x10}}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400080000000000}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1a}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00', 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000640)) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000100)=[0x7f, 0x8]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fchown(0xffffffffffffffff, 0x0, 0x0) lseek(r2, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x113) process_vm_readv(0x0, &(0x7f0000001c00)=[{&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000001900)=""/105, 0x69}], 0x2, &(0x7f0000000440), 0x0, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x7a00, &(0x7f0000000000)) r3 = socket$nl_route(0x10, 0x3, 0x0) close(0xffffffffffffffff) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_newrule={0x20, 0x20, 0x401}, 0x20}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000006c0)) process_vm_readv(0x0, &(0x7f0000000100), 0x0, &(0x7f0000002100)=[{&(0x7f0000001f00)=""/221, 0xdd}], 0x1, 0x0) 00:24:39 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x408, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:24:39 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x48000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000800)={0x0, 0x3f8, &(0x7f00000009c0)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e21, 0x8, @local, 0x8000}, @in6={0xa, 0x4e22, 0x7fff, @dev={0xfe, 0x80, [], 0xe}, 0x1000}, @in6={0xa, 0x4e23, 0x66, @dev={0xfe, 0x80, [], 0x16}, 0x7}, @in6={0xa, 0x4e20, 0x7, @empty, 0x80000000}, @in6={0xa, 0x4e24, 0x1, @local, 0x9}]}, &(0x7f0000000840)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000880)={r2, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}}, [0x4, 0x6, 0x400, 0x6, 0x3, 0xac9f, 0x7, 0xb096, 0x8000, 0x5, 0x800, 0x10001, 0x5, 0x7, 0x1]}, &(0x7f0000000980)=0x100) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) write$binfmt_aout(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000000000000ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f9d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007c5014a5de0d19e946513916c28de40eb70c12996e726158cdf851544e631cd5ff618446a525687c3feda36c2d856ba5730a7e332b6bc3d529"], 0x520) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x3}, &(0x7f0000000200)=0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000240)=r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 00:24:39 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e21}}, 0xffffffff, 0x7fffffff, 0x9, "97b37781d27d9a4a74863dbb600d4861096844cd490c2294c96acb9c93eb092669a2f619568fbe5e466bed76806390ea1d6226dc5a62b09a20de43361467426dcbcbc9dea8e1a35cf97a5f2c9188d9e5"}, 0xd8) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x4e20, @loopback}}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000240)="01000000000000000900acc118d2422f04b3096eeaac886fcec447b9b090816d4881f131bffab03347182f1a1c035190456302da539776143b812ee823c651883149f72f727c35a55ffe93216300a4a1c84f83a58b1dfb495025d5aaa70b97a28ea4d4c613de7f837dc09a4500d618162a0fd4287e7d27becf364c7f8633bd2e4b881028734df17390820d98c72dab77927e6c6fb6825a0e18cfe66b26a1514ccc5565e4af31066466b3b8f6dedc88b1144451af3140e790ed9cbbbbd95de42dea136a65382d4b2c696096ebc815f8f9") ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0x3, 0x8, 0x4, 0x9}) [ 462.915502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. 00:24:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7, &(0x7f0000000100)="0a5cc80700315f85715070") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r1, &(0x7f0000000280)="18d717d0417e86c485599b7ee1f27111e3c361df18104e64cdfafcb20300000000000000f7a366fbd740a179c8387207140a2fd8394a3cec5965e437cb369a33b0dcd5f3e54aef8d60a50093c89bd0", &(0x7f000089b000)}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000140)={@local, @dev}, &(0x7f0000000180)=0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000, 0x0) 00:24:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000003c0)={r4, 0x6, 0x8, 0x7fff, 0x7f, 0xd6a}, &(0x7f0000000400)=0x14) r5 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xe0, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r6, 0x0, 0x0, @in6={0xa, 0x4e24, 0x9, @mcast2, 0x1a5}}}, 0x90) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000001c0)={0x2, 0x0, [0xfffffffffffffff7, 0xf1, 0x100000001, 0x6, 0x80000000, 0x69, 0x1f]}) r7 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$evdev(r7, &(0x7f0000000680)=[{}], 0x18) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) [ 463.161324] minix_free_inode: bit 1 already cleared [ 463.183126] minix_free_inode: bit 1 already cleared 00:24:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:40 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x100, 0x2080) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000380)="94220ca6de7430b701460644cc874fff57a6d003f60b24e8a1acff3680ca1395f8817aab8c275392f568c1b6e6ab35617ba79ffc65133bc040dd6a2f35d31fcece2af5a113c26f7c17", 0x49) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'cpu'}, {0x0, 'io'}, {0x2b, 'memory'}, {0x2b, 'cpu'}]}, 0x16) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000002c0)={'team0\x00', r4}) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 00:24:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500), &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:40 executing program 7: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @local}, 0xc) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)=ANY=[@ANYBLOB="0180c200000000001400000008004500000000e00000010000000000089078be30ebb69cc1b1b8000000"], 0x0) r1 = accept4(r0, &(0x7f0000000000)=@ipx, &(0x7f0000000080)=0x80, 0x80000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="c869fd0a", @ANYRES32=r0, @ANYBLOB="000327bd7000fedbdf25010000005000010008000b007369700008000b00736970000800080002000000140003000000000000000000000000000000000108000500010000000c00070010000000040000000c000700010000000800000008000500050000000800040004000000080006004b0000005800010014000300e00000020000000000000000000000000c0007000400000020000000080004004e240000080004004e21000008000200ff00000014000300fe80000000000000000000000000000e080004004e2200004c00020008000500030000000800090003000000080008000800000008000b000a0000000800030002000000080003ffffff7f00080002004e220000080002004e22000008000900010000000800060003000000200002001400010000000008000000000000000000000000080004000101000044000200080002004e200000080006000300000008000b000a00000008000400030000000800070005000000080007000010000008000b000a0000000800080077050000"], 0x3}, 0x1, 0x0, 0x0, 0x84}, 0x20008040) 00:24:40 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000001c0)=0x534efde5d2bae475) accept(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="80fd02090040", 0x6}], 0x1, 0x0) 00:24:40 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix%', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 463.227147] minix_free_inode: bit 1 already cleared [ 463.240239] minix_free_inode: bit 1 already cleared 00:24:40 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500), &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 464.034204] minix_free_inode: bit 1 already cleared 00:24:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={0xffffffffffffffff, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:41 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 464.207436] minix_free_inode: bit 1 already cleared 00:24:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xa, 0x3, 0x7) r0 = socket$netlink(0x10, 0x3, 0xe) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="48000001fcffffffffffff00000000000aff0007667e279629a91d7bd91397917daf4204a00b32eadc2828417fa20001e3d8960f65b27ee800000000000000000000000000000000"], 0x48}}, 0x0) [ 464.303478] minix_free_inode: bit 1 already cleared 00:24:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 464.686168] minix_free_inode: bit 1 already cleared 00:24:41 executing program 7: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1000) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r2, 0x0, 0x0, 0x10001) sendfile(r0, r1, &(0x7f0000002000), 0xffffffff000) creat(&(0x7f0000000040)='./file0\x00', 0x0) 00:24:42 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) socketpair$inet(0x2, 0x0, 0x400, &(0x7f0000002b80)) setresuid(0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') unlinkat(r1, &(0x7f00000001c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/exec\x00') ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) clock_adjtime(0x0, &(0x7f0000000600)={0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x8, 0x0, 0x40, 0x0, 0x2, 0x0, 0x1}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x10001}, 0x8) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) keyctl$session_to_parent(0x12) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x6, 0x2, 0x35b, 0x1, 0x8000, 0x20, 0x0, 0x0, 0x3b1, 0x8, 0x1}, 0xb) listen(r0, 0x1000) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 465.048191] minix_free_inode: bit 1 already cleared [ 465.080159] minix_free_inode: bit 1 already cleared 00:24:42 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x18) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x3f000000, @loopback}, @in={0x2, 0x4e23, @local}], 0x2c) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)) r3 = dup3(r0, r0, 0x80000) ioctl(r3, 0xfffffffffffffffd, &(0x7f0000000300)="b006b47fe5d67846a39579518fe14791e8ebd47fcc7df2ebd09ce7cb57089460480deaefb34f199d72ba09b4d383ecf404f69a1045f5dee2d32e22a842a6e49864fcb741cdb6d0aa0677bd3a3389bab58c3f09686aabc80e0f51809cc7d48f062ef5964ce68d6fbcac568edf151e59fe50b33c4c074636e5b1") r4 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x8, 0x4, [0x2, 0xf4, 0x9, 0x3e]}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000400)={r5, 0x34, "e499b79015fca93414bd2aab4e8828b76bdadc511b66f3ca37439e22ccabf06f7a0e580c3c12d1ad7b95f5557f6096736c5b3026"}, &(0x7f0000000440)=0x3c) syncfs(r3) setsockopt$inet_tcp_int(r4, 0x6, 0x0, &(0x7f0000000040), 0x244) 00:24:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f23", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:42 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)=')-\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0x10001) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r3 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2, r3}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x30) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 465.189758] minix_free_inode: bit 1 already cleared 00:24:42 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r0, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r1 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 465.232101] IPVS: ftp: loaded support on port[0] = 21 00:24:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000600, 0x20000630, 0x20000660], 0x0, &(0x7f0000000000), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", 'team_slave_1\x00', 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet(r1, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) [ 465.395445] kernel msg: ebtables bug: please report to author: bad policy 00:24:42 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x20200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d00)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000000e00)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000e40)={@mcast2, @local, @mcast2, 0x6, 0x8, 0x5, 0x100, 0x6, 0x88, r1}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000ac0)={0x0, @in6={{0xa, 0x4e20, 0x896, @dev={0xfe, 0x80, [], 0xa}, 0x8001}}, 0x7, 0x2, 0x0, 0x80, 0x8}, &(0x7f0000000b80)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000bc0)={r4, @in={{0x2, 0x4e22, @loopback}}, 0x8, 0x7}, &(0x7f0000000c80)=0x90) r5 = memfd_create(&(0x7f0000000a00)='/dev/vcs\x00', 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000100)=""/202, &(0x7f0000000240)=0xca) getsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000800)=""/12, &(0x7f0000000a80)=0xc) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a40)=0x0) get_robust_list(r6, &(0x7f0000000980)=&(0x7f0000000940)={&(0x7f0000000880)={&(0x7f0000000840)}, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)}}, &(0x7f00000009c0)=0x18) clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000700)={0x1, {r7, r8+30000000}, 0x4, 0x6}) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000280)={"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"}) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000cc0)=0x5) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r9, 0xc0184900, &(0x7f0000000000)={0xfffb, 0x1b, 0x0, 0xffffffffffffffff}) lseek(r10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000780)=@assoc_value={0x0, 0x4}, &(0x7f00000007c0)=0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000007400000000000000000000000000e0e515320000000002008801260001000000640000", 0x2d, 0x1a0}]) write$P9_RREADDIR(r5, &(0x7f0000000ec0)={0xa0, 0x29, 0x1, {0x7, [{{0x1, 0x4, 0x5}, 0x6, 0x6, 0x7, './file0'}, {{0x20, 0x3}, 0x7, 0x7, 0x7, './file0'}, {{0x39, 0x4, 0x7}, 0x4, 0x5, 0x7, './file0'}, {{0xa, 0x3}, 0x101, 0x3, 0x7, './file0'}, {{0x41, 0x1, 0x3}, 0x1f, 0x10000, 0x1, '.'}]}}, 0xa0) [ 465.632804] kernel msg: ebtables bug: please report to author: bad policy 00:24:42 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000140)={{0x1cf, 0x3ff, 0xfffffffffffffffc, 0x264, 0x109, 0x5, 0x15b, 0x1}, "50fd0ac7e7d5cf23f9f19efce48aa9d2e80f568f473cb2a5fea2913d02b7b00df4eabf20f1d3dc4da30f22c3072437fc69cf"}, 0x52) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r2) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f0000000400)) fchmod(r5, 0x4) r6 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r4) socketpair(0x9, 0x807, 0x9, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r7, 0x40045532, &(0x7f0000000480)=0x4) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") write$binfmt_script(r5, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'GPL(-'}], 0xa, "c69f8a1e6a5a67335fb2aaed1180c3660cafe6"}, 0x24) r9 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000100), &(0x7f0000000280), 0xffffffffffffffdb, r0) keyctl$dh_compute(0x17, &(0x7f0000000340)={r6, r9, r9}, &(0x7f0000000600)=""/132, 0xff33, 0x0) 00:24:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 465.869333] minix_free_inode: bit 1 already cleared 00:24:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:43 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 466.146250] minix_free_inode: bit 1 already cleared 00:24:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 466.310180] minix_free_inode: bit 1 already cleared 00:24:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") setrlimit(0x8000000000006, &(0x7f00000a3ff0)) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r2, 0x0) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000000140)) 00:24:43 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0xc0f85403) 00:24:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f00000004c0)=@nfc_llcp, 0x80, &(0x7f0000002540)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, &(0x7f0000006300)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x59a11239, &(0x7f0000000100)=0x2) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x100000000000021f, 0x0) [ 466.994223] minix_free_inode: bit 1 already cleared [ 467.177329] minix_free_inode: bit 1 already cleared [ 467.204298] minix_free_inode: bit 1 already cleared [ 467.344069] minix_free_inode: bit 1 already cleared [ 467.637355] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.643804] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.651191] device bridge_slave_0 entered promiscuous mode [ 467.679263] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.685676] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.693161] device bridge_slave_1 entered promiscuous mode [ 467.720140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 467.746245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 467.821108] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 467.851230] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 467.958111] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 467.965575] team0: Port device team_slave_0 added [ 467.990273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 467.997505] team0: Port device team_slave_1 added [ 468.024147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 468.050354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 468.077641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 468.101138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 468.339261] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.345692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.352410] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.358776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.220704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 469.305579] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 469.391212] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 469.397456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 469.407956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 469.484760] 8021q: adding VLAN 0 to HW filter on device team0 00:24:47 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) arch_prctl(0x1003, &(0x7f0000000180)="6a6a3d6a6c1154220aea32a5db23bc7dabf0e96813a0fe2965a1793190e16c65d95fab0079f601ee06a8daf8105c9167255ba7ef7bd8f1da53ad0c1a5eb1f7282bb71bcb22d174352151201a40f41505fae97010df7dddc7ed1c0f5910d2c579f6caad51470ef77ec3ec4986630df23fcc9437ef4d051486551326dda7b0a878a423dab9e6777c2f0148bec37f95fdc73fc3678ace07fca6025035b98cdb72c184f3e12962a50855772b5b82179ab742b0123a199402bb110240908d67f6170dac55b6ea5f7a2465376822110058251c6d3bc13834616cacd5ba3c21bdaefe44413bc7e36539257fc91a93bb9b") epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) close(r0) 00:24:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) r2 = socket(0xa, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000580)=[{0x6, 0x3a}, {0xa, 0x7}], 0x2000000000000004) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000000c0)={'team_slave_1\x00', 0x1}) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x4e21, 0x0, @remote, 0x401}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005801a00100000000000000000000000000000000000000000000000090007372680000000000000000000000000000000000000000000000000000012b0605807f00000000000000000000000000ffffac1414bbff010000000000000000000000000001ff010000000000000000000000000001ff00000000000000ffffffffff000000ffffff00ff0000ffffffffffffffffffff0000ffffffffffff000000ff000000000a2004000000004800534e4154000000000000000000000000000000000000000000000000000110000000000000070000000000000000000000007f00000100000000000000000000000000080066ff01000000000000000000000000000100000000000000000000000000000000ffffffffffffffffffffffffff00000000000000ffffff00ffffffffffffff00697036677265746170300000000000006970365f767469300000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003200030411000000000000000000000000000000280258020000000000000000000000000000000000000000000000003801727400000000000000000000000000000000000000000000000000000000f50a0000ffffffff01800000ffffff7f1003000000000000000000000000ffffe0000002fe80000000000000000000000000001900000000000000000000000000000001fe800000000000000000000000000021fe8000000000000000000000000000aafe8000000000000000000000000000aaff010000000000000000000000000001fe8000000000000000000000000000aa0000000000000000000000000000000000000000000000000000000000000001fe80000000000000000000000000001cff01000000000000000000000000000100000000000000000000000000000001fe8000000000000000000000000000aaff010000000000000000000000000001000000000000000000000000000000010c000000280069636d70360000000000000000000000000000000000000000000000000017180800000000003000534554000000000000000000000000000000000000000000000000000002070001ff5a00010607000000bb339f1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f00000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000034000c20d0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580180010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001bf07030801000000fe8000000000000000000000000000bb0000000000000000000000000000000000000000000000000000000071df2cf303a76568ff000000ffffffffff0000ffffffffffff000000ff0000ffffffff0000000000ffffff00ffffffff000000000021001000000000280053594e50524f58590000000000000000000000000000000000000000000000814700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000035650000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, {0xfffffffffffffffe}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x4, 0x6c}, 0x0, @in6=@loopback, 0x0, 0x1, 0x0, 0x90, 0x0, 0x800, 0x40}}, 0xe8) sendto$inet6(r0, &(0x7f0000000500)="24e65c0884b6a74b1b6fb5d08c65590f45679dc775f51339516a70e844d19db1671e160be5a69888ba240c89cc9d3106ef4a3edaab7a12da5f6cdcc1f739d14209617d89d9a84eb49102d58d2971d139383b48217ff11d8b7d9a8f2cce796063dd88", 0x62, 0x4000, &(0x7f0000000840)={0xa, 0x4e20, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x4}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x6) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={0x0, 0x1}, &(0x7f0000000000)=0xfffffe76) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000007c0)={r4, 0xbb80}, &(0x7f0000000800)=0x8) r5 = socket(0x1, 0x4, 0x3f) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xfffffffd) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000880)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=ANY=[]}}, 0x4085) connect$packet(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffdb6) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$PPPIOCSMRU(r5, 0x40047452, &(0x7f0000000600)=0x3f) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000740)={{0x0, @broadcast, 0x0, 0x0, 'none\x00', 0x0, 0x2}, {@remote, 0x4e23, 0x0, 0x0, 0x10000}}, 0x44) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYRES32=r4, @ANYRESHEX=r6, @ANYRESHEX=0x0], &(0x7f0000000480)=0x3) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001340), &(0x7f00000004c0)=0x90) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) unshare(0x0) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 00:24:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:47 executing program 6: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f00000000c0)='v\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x200, 0x204000) accept$alg(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xfffffffffffff000}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) 00:24:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000100)=0x0) r2 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3}, 0x14) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x5ee}]) 00:24:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:47 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000980)) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) readahead(r0, 0x0, 0x0) 00:24:47 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x41) writev(r0, &(0x7f0000000800)=[{&(0x7f0000000040)="95", 0x1}], 0x100000000000011c) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x4, 0x8000, 0xfffffffffffffffc}) 00:24:47 executing program 6: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x8000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:24:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000140), 0x4) futex(&(0x7f0000000000)=0x2, 0x3, 0x2, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)=0x1, 0x1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f00000000c0)="66b8ab008ee0b8010000000f01d90fc75ad8650f0666b81a008ed066ba4100edf30f11cdb8010000000f01c10f070f20e035000002000f22e0", 0x39}], 0x1, 0x0, &(0x7f0000000000), 0x3c5874240f3565e) bind$alg(r1, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r4 = dup2(r1, r2) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f0000000240)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:24:47 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) getsockname$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES64], 0x8) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0xfe48) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000050001000400000000000000000000000f00000000000000"]) 00:24:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="0a5cc80700315f85715070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="92a600002700010f000400010000000002004000080001004144b2123a17be96baf6a16cd5ad56cea29e9ed776b811ea660259735c6188e7874fc8a342df02295c8dce75114f8e915b86e5d79910a6a83450360aa3a15cdbb2f8a4785a7979602b8a2d1bdf5a70ca5fba586b88bbece1e3a2c2e6e42c85ef553c0b876d256c6b3e3e0c53200c6dd9b0123e69d322aee911bca082da50b4c5c117e5fc4ac6a286bca58cd9dfd13e761620892c56d042093beb5d0962ed4244a0befb7f2e0524143fa0e35d1ddff7a267179ef8fc3f8d94f09b9d0bbfa791676984c7d3f230121648a5e59f2273cdf92d55", @ANYRES32=0x0], 0x1c}}, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000000)=0x3) 00:24:47 executing program 6: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='data=journal,barrierR']) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xd2d6, 0x400101) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000140)={{0x8, 0xb9b, 0x9, 0x20, 0x67e, 0x8000}, 0x0, 0x80000000, 0x7, 0x80000000, 0x8000, "e3d90e85551465290892486bb98a1d984dd7fedc07285679ec0ff0cdb3eb96237bba1ad8f05a5bc9e4c1bbb5cbcbc86a33e803739e7afeaff5a57bf0ec348d37c5c4357159dc2df3e48e4ea022241c754b775b7b40b13fe0f3f98aab5fe7139b88ed5f0d58398a321cbc2d240f7b8e8de02b6edc608e5d8ccba5cc1562f89cf4"}) [ 470.512359] *** Guest State *** [ 470.516061] CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 [ 470.525235] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 470.534159] CR3 = 0x0000000000000000 [ 470.538040] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 470.544106] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 470.550159] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 470.556921] CS: sel=0x0030, attr=0x0409b, limit=0x000fffff, base=0x0000000000000000 [ 470.564971] DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 470.573004] SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 470.581169] ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 470.589422] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 470.597463] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 470.605510] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 470.613541] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 470.621591] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 470.629627] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 470.637661] EFER = 0x0000000000008801 PAT = 0x0007040600070406 [ 470.644120] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 470.651638] Interruptibility = 00000000 ActivityState = 00000000 [ 470.657970] *** Host State *** [ 470.661226] RIP = 0xffffffff8120b174 RSP = 0xffff8801c96af350 [ 470.667261] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 470.673753] FSBase=00007f2ee1e41700 GSBase=ffff8801db000000 TRBase=fffffe0000003000 [ 470.681600] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 470.687555] CR0=0000000080050033 CR3=00000001842ec000 CR4=00000000001426f0 [ 470.694619] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff86c01380 [ 470.701373] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 470.707470] *** Control State *** [ 470.710989] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 470.712235] REISERFS warning (device loop6): super-6505 reiserfs_getopt: head of option "barrier" is only correct [ 470.712235] [ 470.717706] EntryControls=0000d1ff ExitControls=0023efff [ 470.717843] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 470.717855] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 470.717872] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 470.717923] reason=80000021 qualification=0000000000000000 [ 470.717932] IDTVectoring: info=00000000 errcode=00000000 [ 470.717939] TSC Offset = 0xffffff0249b107b0 [ 470.717970] EPT pointer = 0x0000000188c8a01e 00:24:47 executing program 7: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) perf_event_open(&(0x7f0000940000)={0x1, 0x70}, 0x0, 0x0, r0, 0x3) [ 470.836956] REISERFS warning (device loop6): super-6505 reiserfs_getopt: head of option "barrier" is only correct [ 470.836956] 00:24:48 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x0, 0x418040) r1 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3089, 0x200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r3 = accept4(r0, 0x0, &(0x7f0000000040), 0x800) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="bd7134f7bccbbcb068bd50452d7bfdc3f6df82ce23b3f6211a0ef8b17aa9fb1fe2077d8fb60e682619bc4bf5b0f5bcca3059ca8b7e0b5b9c4443e776827cd4c43a709b202d86e695a593b53b069a160dc19a72e36406ccff15d12e9a1d58588b247786dd08f41d9470fb62d43f074f1f3c644a6b62795e5a01eefdf72602139ca9d3a6de633b04c824752b91d16fe90d60974552485a8b92888ef6db18cdc48affb8e08a84f5c0697df657808b8c73a28c172b00", 0xb4}, {&(0x7f0000000240)="3b430a1c4041902ddd08df5b4979859ab89efd030132be14bf41b8d76524086ca040d15226ac5688b0d98d79ba009b256014747fca8856c8dedea03f5213002d91dbbe68b5f12d56f6151d66d28a20201079882838cfbc2850f440249676a2507218b40a1ee5b15e2e11b9bf2bd080454b6b6a15ceaf7be01dde8583aa3aa542bdebb7b58a112236f8d1838f14153a0ffb5b240e472b6d63ed55222cdde231c5a216d0cbdb9623ec3ae1cd932fdc7ab2fe877c542bdf27fe0bd6a1b79051fe4b4444ac6aa30fcb4325cbf09def7952c49f884133d6c4ab675b1fb11d8908ba714a2e7c1cd5", 0xe5}, {&(0x7f0000000080)="da037b49788708c702e49a6fd708f0d0ae9c9767922bb29b7288479b9a3418c965fc4f9df821fe8e91ef1e1c19a29555f556e69b27c60303a3330675fcdf085a148dac51a9a418109e8f1bfaeb2a1607b252949b492f86cc639094fc78f268025477d3831b2f3e478e65", 0x6a}, {&(0x7f0000000340)="f3d90ecd5a4adaa36b07f5ae3c965cf0e3a37881fc0943eecbd0f55db5ecfb051318761f3c904bcee7e33b4c0fd32b97d9f12e3dd96ce88452990d3342375abbd734214e14c994aacd06a80cfc73f68977d2af08d618aac7572399aeee760bd32111081221b030c05061529070d419957505a588221deede1f47476067725d01f7605304880d5525ba296d84ae60e4cc28aa5940802c96904c3eb78fa107f0c2", 0xa0}], 0x4, 0x0, 0x0, 0x40}, 0x20000080) sendto$inet(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) 00:24:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)={0x0, 0x1}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000180)=ANY=[@ANYBLOB="2600000000000000366a061d682a8f840c96a00f5fbee71b73261b241cea2df4a62ec460741ff9232420478b8482f3075372453426d84918d694e123b6bd1cbd767a318a2a7fae7d39ee4e46df3a727775ff798eb09e89a911ebdfa9b688c3f1e26797dd0f02181aef27e7bff0d0b994a5eb33c5cade20200d3f977ae381514d42d75e2c06b6f3c077e3b3672ff7399a3ef597dc6d9ecf7df0121f638a25e1a74f89f6ea7148c96f53f287a2b96aa6d756ca77bec140b34ccc10cf6b89c81bcc51f0dfee00abe626f7cf1fb50b22749575a7ea1b604719de72277ec9385481f3637d93b133f753d15643b1657bbfedfa"]) dup3(r0, r1, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x400040, 0x0) [ 471.093192] minix_free_inode: bit 1 already cleared 00:24:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x40) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000140)={0x5, &(0x7f00000000c0)=[{0x5, 0x7}, {0xfff, 0x5}, {0x48, 0x9}, {0x1000, 0xe56}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)}) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000f7ffffff000000000000000000000000"]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000340)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '!'}}, 0x22) [ 471.188182] minix_free_inode: bit 1 already cleared 00:24:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e69780f", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9eb", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000001c0)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x40c3, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="33b2e86140d139ee42ee313deb2c8a81c5030350f3c61a8faeda4bf909920bc174169817e4757d92731c8444f536079127b818a75b105db4734c2bf223f251c45e01000000000000000b2a97644cd05013e83c9561791c289d0e00249e2437d1b4cfe941e46735017232cd962a06f4a0e900000000020000000012026ba800", 0x7f, 0x1ff}], 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x80000000, 0x40) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000400), &(0x7f0000000180)}}, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) 00:24:48 executing program 3: capset(&(0x7f0000b3e000)={0x19980330}, &(0x7f0000f21fe8)) r0 = socket(0xa, 0x2, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0000000202"]) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000824000)=0x8, 0x4) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='lo\x00') 00:24:48 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:48 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="1402010000000000ee", 0x9) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) sendto$inet(r0, &(0x7f0000e76000)="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", 0x5b5, 0x804, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x280441) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000200)={0x53, 0x10000, 0x9, "efd861fdf5bd4d2cc06effcf151dc489e87e60ad2347ab616148f71cb80c28d665993bc41ef5c270c961784429e7fb7c5727c91d76fc1ec2478fd858cb59cf5ecdc6ea20062a16f206c36740326af0ec21e198"}) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080)=0x7, 0x4) getdents(r1, &(0x7f0000000100)=""/245, 0xf5) 00:24:48 executing program 7: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x78}], 0x1, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x210000, 0x0) inotify_init1(0x80000) getsockopt$inet_tcp_buf(r0, 0x6, 0x16, &(0x7f0000000180)=""/238, &(0x7f0000000080)=0xee) r1 = add_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000580)="6f17082493daa75733b0c5d8c9e5c3b6aca615fc3f1f12c7973e0b7c6a21ce79631f37bd538977dab84330992c9f39da4f75b6337a9837b8baf8cebcd19045075f758762f5cbe38a0cbf0e3c858aa0fa8bb0d869a00fd0ea1e1af748cf86ba9de79fb7d59e08cbef551fd4df0e614da2878a15c5ffbf284671e42fe2d3743977f7b65a020083c8692a426eb0ca68bf9a43b56411f7ee79c20b6d3a60a7d3f8b154f8fe0b4c72ad933e891eea2012eb79bd86b39a4660b03afff60fe870fbca7d5fd256796e7f00cdcb002bf5c81894d4241858974fafc4", 0xd7, 0xfffffffffffffffd) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="32050d6743a28c030c4f606665e4e97c777699b941bc5b393893ff3bce0de7df825e11c66ea6eef1a9c5db84d1aab007d9b97c06ad390c32bec79869947f200ddb73177519135514e8e0b03a1d44a54e29252c4d32f84b4154810925f1dfc3dd3e48f8021d4a721ba22d75a7de5342a9ce11f6fec3ca314a88", 0x79, r1) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f00000000c0)="96bf8bbc5241fb4b5a8a78a3f13f4393b19b73276b9125cb39b023df74124ea03d1d76c147d568068dcf97f7e2885ee05156467e921f7c9e7e8e07c27c6b95e884989a7f6f2bc76b5f82680b5ad3ab8fe2474f697b46e9b9eb5e72d5627ea310227984e23c343ad9ad", 0x69, 0x4040, &(0x7f0000000380)={0xa, 0x4e24, 0x100000000, @dev={0xfe, 0x80, [], 0x15}, 0x8}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1, 0x10400003) [ 471.250475] minix_free_inode: bit 1 already cleared 00:24:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="db10", 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) mkdir(&(0x7f00000009c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) mount(&(0x7f0000000a80)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000a40)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x7a00, &(0x7f0000000580)) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 00:24:48 executing program 0: msgrcv(0x0, &(0x7f0000001500)=ANY=[], 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x1, r1}) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 00:24:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='nv\x00', 0x3) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000001200)=""/145, &(0x7f0000000040)=0x91) 00:24:48 executing program 7: dup2(0xffffffffffffff9c, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000240), &(0x7f0000000300)}, 0x20) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x7ff, &(0x7f0000ffc000/0x4000)=nil, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) [ 471.571817] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 00:24:48 executing program 6: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000002901000004000000000000001d0000000000000000000000000000000007002e2f66696c6530"], 0x2a) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x280, 0x0) ioctl$KDENABIO(r2, 0x4b36) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000540)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000740)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'GPL!cpusetmd5sumposix_acl_access-lo$mime_type!selinux^/wlan0'}}]}}) umount2(&(0x7f0000000500)='./file0\x00', 0x3) [ 471.671202] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 00:24:48 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r1, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote, @rand_addr}, 0x6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000200)=0xfffffffffffffd35) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r2, 0x0) 00:24:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000006, 0x0, 0x0, 0x2, 0x0, 0x70bd2d}, 0x382}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) 00:24:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="db10", 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) mkdir(&(0x7f00000009c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) mount(&(0x7f0000000a80)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000a40)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x7a00, &(0x7f0000000580)) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 00:24:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697802", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") syz_emit_ethernet(0x74a, &(0x7f00000010c0)={@broadcast, @dev, [{[], {0x8100, 0x6, 0xe04b}}], {@ipv6={0x86dd, {0x0, 0x6, "b3df53", 0x710, 0x84, 0x0, @dev, @dev, {[], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x0, 0x0, "96b6f6320e560ee09dd40a829315d259b5b78248c008d424ecfbc3c8a58e469b35551cd0fc658d0e28788022a52dd82f14ace3132856e8348ad378f7da43f6b469f24db97ebff29154fcc55fa0cf5e4d2ac8c264b01f6a42915d3fe0c417f9b3ce81d61a4a15e5371521b7027230c2f89b62aaf4be2fdf2f8a7ba5860e6bfb2eb7475e9bac07cc3221cd9dcb34a014b49e95edcfbd8294d3e4881382c92853051d424c7de8af4dfbbf54603f096c17115ccc6fe7c23e84a33196884ccb31d4f89c0515121bc4226592347f8e4cfbbc6a852cc281a7b32cd363fbba3209fab5b33c1581b181f01bba4e3ec759c65183bea87bdca3033cf629159c617bd5dc57f9815fe4fe540392db8a7c343f35c095b69aa8abd5109a52e66712fff345feef93c73b608fc2a4cf6374f32f0d635687005a34104b107cc103d7cae9804e4eba8953ad782c54747268a072632c2c263e2d094643aa3beaab230262428282c59bfb2a7feda1827caaed6d0b7f9315b56826af37cb4f188aa3f784bdfb63707d26fb32ce43f1d69f54c35017172ae4f685e382fe5c4fd0f3b6158c204cc0092aa5ad5e17fa8e640a9ec08cea7dd277c3ed7d9cfcd8105f900f18ccf50509302d7eb8f4f09bac124ecbec46a8e189f278ecd1552a923d12f2ce5fe8c1beb07d37c1263ddeac79052e43626a8c2b6d68816a15207d8a7747a21cfc378cf80de98c591e7d592d5fe4213cb339367429f2cb7fe9273cf9eae858b9a3e98064a006940c0bdcdeb7aaf531c5d30397803e27dfc674dbd87020efc02394dd08bca154d15f00a5263668ba41f8745dd4f9d5520f7d6d2f8fc7e10bdbf89f6f81ede48da801d4dd533752014acb49f80ce4d598541f51b2acc8ada957a196e830d325215c519d7ccc07c7b4a699cc6f05dfa09048ad3aa715e16c47bed3de96c80ff26ddbabefd6d0b8db0ec2850b115180ed8f6877cf75217caaaecf4d2f1dcbca42ea7177bcff7216222545c7243a83f77839f326191a9ee55adcf17d5568ec2feff5eea6a418b4c63f44de25ef2c868df35191ec5fbb2bad6afc990128ea7d0ef596bb8687576dfa7327959edc5098cc0279019eb5ebec40f09e69c56e4ac282405ac6c31bef3d4e14af0bbe4cd7690fb09bc3ff91379f5f5f5d220529cfbdca8938dd9302895d89f1100b7b71d2a46183f3d78f087c81c93aa5b06b0d10be4fceb1aa09fecd148e1be49db7831ca4c122a4235f9c7d882847ec5430335bf8002ad487e8e78c123b8a5278ba158a183e377ba95cabd18c17184376a9709759862eee4ad200e8204236e1ba277351faf53c19ac09b436197af3c6bae6876d53d403b22b63a24e63c2ff2758bdba3a9d5fe0f8529827f3cac12fadc93d4ce235e768f560ee58e75d90bcf931b4ce6d801613e67bd229a375039632fbf3b1107946961ef63e4b77b5ba12759a5a8d13685086b9833923832f7e5a0336ad6ad156a1fd2ff8b992a68699533f69560b162b4c75b947981846827a61077d6aa70d96198ce85ce93c70e418648da1846fb5fa2b320aa2f2b37f14d5d1942c07b3fecbb14b104cf50c61a9e1ad5be164a44485e7429a3094303bc6fe77739e40a0038044c7b7b02e3b7a35331d79b22733cbdb3627099afbc4c0fc332b4b750c971e46ba9208dbaa01d108f5d2593cea0645902ed93e6bb80190af014d11d95997f53ede83e51a80e6076e6b7b3d9203de9351296c57d27c164e16106b56c9eea5eb0ec3803c49f014f3fb9276d54696ad51c2d577b0a29b966ec9cad87acd0f4b977c7384ef916ba8f95c501159b80605039066d6fe96c5b46cf36068e2c2c97859ddaa3bf8303f38959a52a49fca5be7edc9cfdbf05511d3318be17545bcbfbef7451b416460ecb0cc0cc1bf3f2d6c972d9a896b1dd4bca5671e4f15fe8ec96eecc4f0c1ed91294a217a87fc673208584bcacd2b4cae01e1f9a29a7f17204faf66c7c642095d4c836e89dbad8232ea18091231df8ab64266dbd99490407edbf7f195656f049c9c85214aee4336c6e7df3c80c9ad6998e326839b429a82c449fac5945ee083476a85151fcae6eac85c753bb66082a644b7fd6f30b658cf6ec55fd7937cfdf340b909288aa163e410de78be29463e2a99f4c2a10b13d5ec7fb72d06d7f0c4c282a383b6b0ffab92a14160468cb98c30f846a1c2744f17cb3f3f7358d7931901623814172ef388c19f7d0415b8bea28d9157320357caff6ddc163d1dd431c43bdeaef931c148dba6f98b2c3e0e5901bd36898f26d0a3f4ba33df7c107431a7615c20345b2231c4af581cdcd73d4aa94427b5ad7aa0d48b32159cdaafedc7fd230540a76792f5d9e86d2c66dbb23d7f89a1769305e9ebe32bedd9f8af239e193c74f3b24af43e2131c4ed90f21cc87011f7501b99f61c826f3e79e5abedcbd9f95fa545cf64499d7be7698e80acd7f9101778a54c14973e852b695ff6807e1833d4803132a24e2f0af7a2913a0dbb8697ef047a065bb5edd8f1a8fdbf78bc4f19d49bc6ca96dd6d11d785fc"}}}}}}, &(0x7f0000000000)) 00:24:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'syz_tun\x00', 0x2}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'bond_slave_1\x00', 0x7}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x401, 0x8000) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000040)=0x10000) 00:24:49 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001500)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000015c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)=@getstats={0x1c, 0x5e, 0x100, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r1, 0x1}, ["", "", "", "", ""]}, 0x1c}}, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x250940, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="3400000012000d00000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000090003007663616e300000000000000000000000e4782e6e2603d468a8bf6cc1e3f2c595fc0cadabfb13a1ed89167689609291fe51fcf0e830c36d50"], 0x34}}, 0x0) 00:24:49 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x141140, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="ba6100ecf3af0f8aa100baf80c66b8f65b3e8466efbafc0cb000eeb800008ed00f5eae2bd90fc79f0100260f01cbdb4a0e2e0f525a00", 0x36}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)=0x0) fcntl$setown(r0, 0x8, r4) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000100)={0x5}) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000140)={[{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) write$FUSE_POLL(r5, &(0x7f00000001c0)={0x18, 0x0, 0x5, {0x7}}, 0x18) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000280)=0x3f, 0x4) ioctl$TIOCCONS(r5, 0x541d) ioctl$KDADDIO(r5, 0x4b34, 0xd90b) [ 472.188207] minix_free_inode: bit 1 already cleared 00:24:49 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 472.240085] minix_free_inode: bit 1 already cleared 00:24:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x0, 0x6}, 0x2c) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfffffffffffffffd, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)=0xfffffffffffffff9) 00:24:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000011000)) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000140)) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x7) 00:24:49 executing program 7: rt_sigprocmask(0x0, &(0x7f000021f000)={0xfffffffffffffffe}, 0x0, 0x8) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) prctl$setmm(0x23, 0x5, &(0x7f0000ffb000/0x2000)=nil) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000064e000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) sendmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000040)="fa5dbf3be502762384a0cefb5ffa6789d0ae06ab45042da9dcc792325ccb58deee2e52f924b03434ab", 0x29}, {&(0x7f0000000080)="9024bbaab5e4ab1e8ef2907769805f4179cba7a315b92d34590db6f1d32064bf002eb5b7f632255b62a8105c0fb481f48e8496ad88b2c988000a3d081d", 0x3d}, {&(0x7f00000000c0)="7b1c043c4c7cb759dc5ca4e3a34bb79afcac53488f9145ec58b05f91620180c0acd06c8fb6484d12114560ecb1f068a43bea24d4d7a1607734ca0639654f41e7c2c62a684e63a4adc8342f52a13f0e81", 0x50}, {&(0x7f0000000200)="80b9361e69bfb5317397aead5bd11f2bd660851db533d820fd507f9346e231a1d9b3dd17d8b6a893baa8be71572ca3615731eccbfb6ac1543a97df54396a2410f48073cc87032944c6ba70c28ddbc214525f73219734be660fddb3ca1b83ac1a6e0c8ea513ef9927be317deb309062d8920c0657d4fe17c2f5ee2d9406015fab10258975b60fa0e6a687659c81d8f6912890bd17587d9b9d16ee7e3669e22fba2be9787f1d5b0b4ec9e44635b03d17e46291da2bd3d234", 0xb7}, {&(0x7f0000000140)="91aee22798ad9d5d25a2d78d6ad8555df450ae784884f4154bbe167776d3e25400b87b802d6d586371e218c57172", 0x2e}, {&(0x7f00000002c0)="5156c0c954fb5cf1cd335e8092707bd45f34847fd5a644732c35c6a959cec5010bf3331827fa63efde4e5c9e503a83ddc971585ceb1e9c19866e8cb19072f6578a98ec12dd7c8e9ec2d024b3761da71eba74ef00a4bed4f700decbd85f09ceee1a30d8b4fc1ffabc072a244533ed20f8e764697817a152ae51faafb1e7ab5348bb84de261e54930930c5706e9848f342a8fe94c991286b7eed24413655c475", 0x9f}, {&(0x7f0000000380)="723db6167316b5b26a1eee306e9cbc265edc4d9d3cdc413eb9b77417b9809f8c1102d737de8fb59373492e23075152f68e22fc427074b0ba6fc85a25cc586c63c659c86428d15808da8683acf9cae5d45dd00db9c1509bb8607843abcfe09846d4d8df3f2d9c0e1b68143e20d41a39fb610a41bde280f39f55e52808927ab8dd7cfad4faf2aa81c0a9ed2085b673a9a556aacd14d34dab7f709448f6019a153fcaf21909bc8b2bd0cfbb9fc2d5d3e2087b00914dc8a0637663309be74023e18409b6d6c26ae93d46638379a0943821905a3e5976b3a0b3f22594e3fb6460b8a694c03a984377b3346eb0e38907a8a3c84fcac058bf2d46e6489d26162c039c011956c06df3809d6bb920acf8a9fe0c09a8aca7db276797297ff222177434562de9ecb710b28f3cb56051ec327ec85e53562d8684524c9b43388739c74bc582d0e1beb25e1b0281b61144c771e7c14799f7cd5b271039f6e27e90962492a0514a70dea9034aeae059cfb9f6df48e6cf177d3ebb0ffa5986869a85704a6e9dfe8030114859a14511cecb29b75cc5c10c67bfa493819850cf23983658f8da1367f953cef35209e9996a95e80b1bd8569bcdba4a1f86621ffc0de8942d12eb742538c944558caaba6e96d4e4c20b6315831609898b7d07de15720c0cdc4766954314c4726654d9a37e024ec3e51e7f41292afff1ab58355cfe21c0204056805f333bb561a73ce75def170afb1343be4bbd11f01afa7f42eb807c37917fb5c798193de25ca8c7d6e46ec14dc5250f386c1cbb966203596360e0366411399785c784e2317d4bda175b7d61b3a61f81bb8e6d8065ab50dbc999f0a5f848998be61115bad7aee4ce3ec6ec61006cc004c04fc6b027be7ce5e08c299a1143d1af60e872e01a5475999eafedfad0c9a9789bc1948da32c53b8cd52ff8197254e84b53124d3c08709bc53f158a9aa1be251c3c0e8c4ca6088b4a3a5a1fae2d993dbfb719c6fa69a8a4d23703a652227b5022d257086430a02380c9e5ac47bfced55861cf20010dd847d27899ebe5f2d9293ba0f3a99bf92873aa18422ef9797bae6b89481f41d18fb67e3602ccedd60e316296268ae3c46af70dd4ad35347a6e354669fd0c7c7c7dc65687f31e3ffb03213eee928737c3cd25c6789d6945631c08a70f113b17bd1fa46d116944fe7489b4140298fd4adf1d50a075e42c5fed9bd4c85588f87d62618435b6705a9c5a441438af31bbd667e890c35d5f06b5422843539177cb09cdece2e751c4189ebfd764f78be3bc80ea0d9c8e63af225810991f53d1d91754b558b6ebb4e0910c55e973546fdcb1ba01baf1af54ad3d639404075f2150a59a37464d39e83fe70b3d8b9dcc1ca8919ae62aa84a7a9f7d5eb937123a02ba5a1978b63a47d1e6c25ed3359b2179283b2a4a45e1ccef7ac37f5b8256ca622098d68b2e490233aefb8d7a2b3933c53623c3f3c9e5e87e06e15630a72cf8b4f9b32f391d35a2a4ce1a8380ab14669eab5d9505244e4437ef23ef0dcf798a931feece5e290abffe58c25583b4f40cc9a1b12a3272a30a3d037556f289e1ba073654536542ebc67f7764dc0121d7b9742697fa1d1a55b2fdbe33c3b455a08dba330fd190e455ff0a4973d307a32bda256d21312a038318f5653a69b2495fb17fca16d46597af124639ca6cca18b4c83ab9ef6209b315508abf401595ee97d475bb7a2c984e9ede1e1acd443fa4500c5b8c63117205a455fc71e0fb4848819c533aba36e24fc493394a3c79e940b0ce434b848cdeb4431f67c9f034b3cb70ee43b654339ae60b20e26a05753d709e92c8fe7d4eef1678735c434d1926b7dae04d8c309d7ca8ac2cec146913c180d9ff4fbd5df3cf5c9dff885115ca4256037625ceac6b6d5d06b6de23d526b826fb2a8e3cbbe7e6c1c313021d523bd132208d44d8e382a9f8f0e90d09e15b6523ec87e0921a18be5c50c073b4bbdf3a367841b670930467e360edb60bfe2ec6d5948f20416ac39eb6aace9c639ed6ff104a2aeb5084ee50de70a4824a53aee3765d525a7d04e5e1c64815067289b8089ed10a41233751c39df8cbc0e55baa69aa1737062181d2153901fc3d14c00f6c82f7f1842696210e64fcf61a151090c2ad400d800fcb94347ece28426ba25d02f89492a76aa049e585aff80ff8d6461e271fd0baf57065fe9c855fce2fdda97934dfbfe37e88a4853c4050b3435e8aa4b483e798df2716b814e326bc6973125ae3badcb999c6d6ba09947fe64abfe90fed777cae50e8f6b15f29e621a1a320a91ef16d4b271347163fd406c1fdaacc570a65e5b3789ce75c9fd16efffe601202821ca171a3b14335f40f058e8e383c8a5ead06ed1405a838a62798dcd9eafbfe406027af0f0fb8ec9976a9275ec9228bf31d13ccac8ab750f3d8bda7f7a14638c5306488aec06a38dd9cb79c6b4e8ad9d0584530d91d546c2950e68a04a90ff01a37d17a15f312c66b380c45a0f7d7a2885d1d5ea557b034918df25b547ec2da226ebfd796d4213bd38104520cc86c65b7c0df5c86ccb9fcfae63ab7501e6c34b60b859c352208b49d7aa37a8b640d4dd9412b4c46900aba29824cd2a44ea6c33650d712531609567cb82c70f8d36c631bb20e184e26a58afd28fc39d68f63a480dbcb33029483dcbc700c503716d0a147a1ca5bb866025d8eb3305a1f16c17421fab371e406098008bccd83591231a2dc716c6ecf9780afd3f3875694588a829dd4c2c5898f72f53f6cf5cca1f0a322e97aee645ae6f68abfbc78c6798a9a54ac7061fca02f24a041ece5c79953067a254d1106a2b78ec6899e007c484a88c142120ec5d3ed8537cd0706e278337fe594995812d4d991d97139c47fe487f6e7fca3487dd393b88eb536004caf0362393774b92cec8cc5e773f88786ebb4c0fb46c201f283e89047e5c6a71002fa88065bfd11a71e173741c699a7b84a9ad08045cac541d2779e7fb71fac61e33511540333d0e6ddf74a781494fa881355e65507ae5968b8880c3b3ae528f5002cad9ac45196b0a3689310621c4e2c2de0900581079538d46ceb4eadef7683b899cb85f819839298fabe2e732f7926f66b6d155da93b0635a6419a3443d9d2068d68680a1a7323be7030c22f259e976fd299b21446c6058791fd366eb68e766135e194ba9223ea89978bc481a0dcd427bb558896c6cec4c7f5fd72c59f1c9ea474c4d76e590f22cb7c163b6f65e3d0dd7421b045bc3867229dc63b402a6123490703ea05107fe4f89ae4bc5762de07edf53c27699c0d57ed56c593743b84e2c5669ea1539bf2eb1fd854b9a8cc40bbb912fa924e2d6727aa30dda279d2df58a0224d58ed63297aa992bc3ffda97b00d0b61f33b2b31b77baff331e0928f6f7407fcbae25d6fae0356275071165ac79136c51639659fdcbe2bc1d208b0586d9803b3e6956bc43ebc8ef2714c0eab21ac25f6cf1d6cf2be6a8a2412ad69f90720a52de78c76bc1792ceb214eb3308da0617a31e933c54d75c8325ced422b75d5be3083e153de928e7b89ff8be99f109d9d32ba138f6e1417e0932784814f2435f6595e2209f3259e6c4895d1665ce5b0f73f0762bc312e88a24e715598553295d170971b3b3410934e192875e7c8e0dabdd35bb06a770d10042d4b26993d2a775af47f51748aa2b01f6c2d4f2184a7cd2d5e37d0b36251c6c8a51021c0afbec8ef28f88f2b96403bf13c0a5eec4e42b3d0a70a4a0c25d0fd0e521161660df62a0432ef46a87beff7f480e6a71680afd2ac017b026037d97ed8c5ba6acdc875af739b72bd50a8010bd329fdd3ba32cdd16450cb74241c0e2663675ede347d4ca55fd3a36025b7a609ede31a65cfd117b3d7e0b7d62720c47a0139165c23dc258dcd1f05064aca85e0ee5b42bf099057a3b64e4604e8f90776eb66c89d6b6012c93758c8b22d12f0bd12aec19ab40a662aa1537ebbdb44f95b34bdd2da15303efc4e5fa7017d2f54dd08e310907b36fca2687b32bb51f149a8254b5f873c764f52109f7806529e5196b78fe1ccd776115222b08d1628434f6ab61ceee2ee4e135c41f2359639c2852d42eed07f97a4808c4d10e93e4b63fd62d9b7675a794d619bbae4811f5a7c0ad987e30e78d44415d42f406a58e2b5d3cd5eba145ae29b7375494aa2de9e5312e9572d8f63271e743eb26e2dc0dac7cfab3cb0dc67a6999b7df3a1b9a8e74d96a7b91f975c87af7e2d5b6f076623412f61091101139eb6c85833939eddbd120109ec864037c1d05538fa2e729b50389668ad0b8bddb49069e7dee4a79cb13cd4d066127b99782d8ae518944aaf715909995f53d9a82a548c707d7fdc36179cce263665fc960a92e090667038eac6caa52d0f55c052cbe10cbae2ec5c9689f47fb52224c749264d03dc94dab3077466a64239df14730c0bac07bb70e297094dd1abb34bee454fd3ff0a9b4964e1c7584b376bb43478c4ca4a620ce42c14726bf74b8bf23d5f236a282f7f16a4fb86579c1ef6c319a7a60ebb70d89ea1eed38565f3397c0945df9a58a0c3712b6630e029eb8e674f4012d5e76367aafd59572af3c0e7471fb8b5f95d7c150debc5cec84a9509da80fd6a7dd982604ab5afe2034923f1efb817a44e897469be95ff058690d9cf96e11df0377fc8d47cdbd343613469829adf46108261ce489a68dbb8bf533847c4e0a016c4d2dab8cc0470572752e78c79c99979320854613545f356ec16cf6f5cc220622020adaf7b8673b55cbb83785204d9f31394c2f928e1358f917b6b2bfab232a949064b255d8cd02a6523b8e0fb79c87d72264d6b2a3cbddc02a906599615f3858ec04d5a324ad2012c35541a7c54afafc16ca2dd4f9f8e15bc042c96db8969c562bc48bee71cf789e7ee53aee89ff11dc750de2155a4ca2222f01c00186ef793f2f6aaa309175528c61d6cca6ed6d6f49362247450e938cd548ddd884e91990617951850961d3641d991d288184355318051f8d2daa3a865c5d097de164aaaa327b3d2bf1c8d3452287ff7f75f0a182c74763237023db69b130c712a5f0285dfabf0557ff23340294f671c57df21685f94f23e49b03237b176985bf88d9d6850419a3be7f002f31567e5f355af9483f0c7691adc2216d6bc4bb5588f043fc96a5cfb63a7a0c5a2626471d17d97943a50242e2edf6ffd0e29240e731cba93941cf9e2a3bd3750445a9a38ef7c562c1096661f36bd931d11aca65944a9eadf1090bc8c5f9f39d62972857126416e24afb6d93f511361fe816e302a1822b35b9bfcb9cf0c5f13ecbe17f3dea367ee6daecb92fd81e407eaeebd73fd79110ed7ab913f057f18a0755b94b4a009cfb5adc4f32e37042f0591a39dedf898a5a1cff953ecf12a9774b9873ddbb90a03e75c2a350bc88743da72be147c13fe5f469f1cfe13e7eded246b94d18ed3f3b83a17b88f3d1805635bc8021873e470e6d8dc8be629275278ff60144afa9a8a4bb09541a6e9b5f3fa7dff1889b641b59a36bd94cb60903d97a7f55a47e0b547e36e4a404bcc2b43fe108c7e51c5acb9a66e47ab0f230ed6fad3d054357c0b8aece6541cd6254e43d9033ab7306169983c3e769e40b713ceb24406c27e5839d196beb4c234257f7578806f55cafdf09d210390cdf8cd1464ae904218f681f90b13ac8bc91e23073a268bc1b8c0b10a38398de1e32d9bd057b43ee9fc0af2c817e575ae777d0de1e2bea82e8b17a8e136e5492f6327bf66f5fb4c0d1b9b7c3197713592ddb0a4cb22703c4edbaa2df7b92272d", 0x1000}, {&(0x7f0000001380)}, {&(0x7f00000013c0)="66b905b3fab7431e8ee6d261d93a050385c3ec66d28f95f6c6c4259c31dd01445789b809219ebaa567c893a2e1e0c3811fa2d2ca7c5da1b927890865b48696abc751077a24140f9ae4904944eea0931a2c74fd55e807d4461dfa6e5f429fc3c219b363150b5cdc8d1f498c7d6974ff15148972d1b81cacdd804088a4ea45e70612643ec06502f1654bf37c0b26755b9d1efe0c92ab30e23a0b8d5d6881f2f3f8927264e22d1ca4ccf7e34c53df0f216ebf3c4abae6b4cf50515c", 0xba}], 0x9, &(0x7f0000001540)=[{0x18, 0x11, 0x6, "c5"}, {0xc0, 0x13f, 0x4, "1508692643771f2c4964f33f95d711c84d1a11088df329509f8d64c67008a67e9dd6b5bb594645adcd19f978fb12a365cfa56df88c15fa780219a731aad9a637b39ed2f71ab09ed34d1bed2b5df50fcb421f1ed99692c11e01ec63c1728747e3d242ff7d442fc1e4923820b0d62b97ed6a3d5918325a66ffca0805421f1f04f9335c6cd64f7fd8fa3a13cfde12f8febab6a201f41481a19beae7357044184f70e436929a239c8dd7553bcc0674"}], 0xd8, 0x881}, 0x80000000}, {{&(0x7f0000001640)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001a80)=[{&(0x7f00000016c0)="57dd7e5e76997e61362a3c37b94172016d3eb4a738737a2bc849766f665dc7c603d23f0fdd6d794ffd3e7488ff1fc19c416ce0154afd7ac3e107dbc91dca504e3ff3f6d1b74d1f193cedecc35de20b786ca64a37ed", 0x55}, {&(0x7f0000001740)="bea9c9f0115f03635d7e19350cbbf2aaa02c3fd44c0a800d", 0x18}, {&(0x7f0000001780)="fb2aeb9d7b5f815cb07e9c10aed99735f36436261c94d6744dff789907f9bbc4ebcc4989df92b3f399aced04e6541434675a30d13b07b48cfac396bb431b126e426c62fd2f5bdb25e03894c58194eeccdac0a9d825b8f3eb9f8a64355239d4", 0x5f}, {&(0x7f0000001800)="d364d6e4658c4638f7bbd8a73ecdc7e97ac8ced0589182f137", 0x19}, {&(0x7f0000001840)="302fb836ff4e2616106efbd1b722eedf8aa1ff625504a8984c356743589b4a9d08334df6ebf7abd374ee66690b70593128a0b4a13101cd5b9b898688a4d796b9f3da313b02e854984f3e326caa1bf5c987c3ace12972f37988bee0c6d26d26bd9ad676c49a9114d0c4dfcb4a1f28f851ba4b8d6a5f9fdda9514246da4d95e7f4ab57426c9f88f44905ac9154fc9025a865f417f68f089632b6e861468b4a8604f509c11cc9bf8d15d3319c409a917698c5505dae0381a45b522dacc4fb269f175586e179fad762d750d8de69475409db6910340ce63e7f0563fe00491e6d4e8f3e83ae96fe859a500fd857c6", 0xec}, {&(0x7f0000001940)="3b03089f54c1a077c874a12684ab1fce897cf6a82a30885c010fb1a39b91ff3567c3d1c367d8e6d579bd047aac55eaea7c54df55a905a57424ad918092d41aa71b239743471cd5feefaa8d2a91675e1ff2fbcd1288ea12751a1dcb80c01823c77423904816fd427725f817c3539b33ff9d3114638205c270b7aebcb707e12cdf2c151cf02e5443f808ad4e2515f58756e239c3bcb8cc1f07d850247d0a8f50bdfc45bc725a14acaf6661c355a9d0c9848f446a023683d7a45294", 0xba}, {&(0x7f0000001a00)="c96921556751544448b5129b77db34ed6e8a2d5eee59a33ebd04f83b6e047310d775b50d86a27ab204fbae07925482f0051e3e945e8ae9d3703036d1dbfa65e45ab1c7ba7dfd68d5b8a1fa35abb6e4e64da5c55b5442fdc364408eea00a80654191e570dd370d10bdc918bb92d3d17652f955496f1aadee331aa", 0x7a}], 0x7, &(0x7f0000001b00)=[{0x100, 0x13f, 0x6, "cd2184c64e4d4965856b315f7edc6d5c6bb860ef39d4d40f1a70c95e19f799399ada7264da43ea755d02b25025b4a552487e164c688e366713950bbd21df27d213c6d80a6a0904e324fb5f7c777d34486ae6194beecb7c9cb48e2066e0880ada775de9cdec6274daaa05af67e776ef20edad5dfc0047b59ff5c253ecbe4d170817e35ff6ca1edb528d409cd648120227cb08e246266b3bbaff388db325afa9a430a91da4d6e4c046b9eb240a9d0232fabc1fa484a3509801134501ae633dc47f00c9ff39cd0391e3c72ae6fb4ebf730629f18261884a7fe88126e7363cf319935b7168c2324552d5b2"}, {0x98, 0x107, 0x7, "d769ee907e16f6cf77e95e715abb13ef17e8c44f36a71a29befadd0eed8297631f09609e5c22bc4b4eec9a82e50db12d59d7b7ae75fa94c59098e896ed4263cb62ce66eaf48e11ef01e8b8e88568ba2164ebc62692b013697ff53a76be7c7b196b4c2e179a8575f91506979a14788f86bc173b9859a72d1bec3f59dc561d63626f5ee70a"}, {0x18, 0x114, 0x2, "3736ebf0d522f8"}], 0x1b0, 0x20008000}, 0x1}], 0x2, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) recvmsg(r2, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r1, r2) tkill(r0, 0x15) wait4(0x0, 0x0, 0x60000002, &(0x7f0000a94f70)) 00:24:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000001380)='/dev/vcsa#\x00', 0x7, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000013c0)={0xffffffffffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000001440)={0x4, 0x8, 0xfa00, {r1, 0x40000000000}}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000001640)=ANY=[@ANYRES64=r2, @ANYRESDEC=r0, @ANYRESOCT=r2, @ANYRESDEC=r2], 0x47) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000300), 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000001480)=0x2) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0xfffffffffffffffe) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$PIO_SCRNMAP(r5, 0x4b41, &(0x7f0000000380)="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") syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) ioctl$KVM_NMI(r4, 0xae9a) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:24:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 472.995279] minix_free_inode: bit 1 already cleared 00:24:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 473.334213] minix_free_inode: bit 1 already cleared [ 473.365855] minix_free_inode: bit 1 already cleared [ 473.447546] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. 00:24:50 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:50 executing program 5: socket$l2tp(0x18, 0x1, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/group.stat\x00', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)="2f67726f75702e73746174002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668ad34a768eb90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x400096) 00:24:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="db10", 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) mkdir(&(0x7f00000009c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) mount(&(0x7f0000000a80)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000a40)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x7a00, &(0x7f0000000580)) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 00:24:50 executing program 6: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000180)={{0x3f, @broadcast, 0x4e21, 0x1, 'sh\x00', 0x20, 0x60, 0x47}, {@empty, 0x4e24, 0x6, 0x22d0, 0xae, 0x86}}, 0x44) r1 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f00000000c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r3 = dup(r2) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r2, 0x2) read(r3, &(0x7f0000000040)=""/46, 0x2e) dup3(r4, r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) write(r2, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r1, 0x40000000014) 00:24:51 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd61795", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 473.975757] minix_free_inode: bit 1 already cleared 00:24:51 executing program 6: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x3) ioctl$fiemap(r0, 0x40086602, &(0x7f00000001c0)=ANY=[]) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x7fffffff, 0x4) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xaab50f433f5d41e9, 0x20010, r0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000000)) fallocate(r0, 0x0, 0x0, 0x1) 00:24:51 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x101, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00082cbd7000fbdbdf250800000020000000000020345ef2df0001000a0000000000000000000000000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x408c5) lseek(r1, 0x0, 0x2) 00:24:51 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:51 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 474.344357] minix_free_inode: bit 1 already cleared [ 474.345305] IPVS: ftp: loaded support on port[0] = 21 00:24:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e6978f5", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sync_file_range(r0, 0x1, 0x0, 0x2) ioctl(r0, 0x8912, &(0x7f0000000340)="0a478a54fd315f85715070") r1 = socket(0x10, 0x3, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14, 0x11, 0x1, {0x28, 0x3, 0x1}}, 0x14) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) [ 474.458215] minix_free_inode: bit 1 already cleared [ 474.863062] minix_free_inode: bit 1 already cleared [ 475.006185] minix_free_inode: bit 1 already cleared [ 475.258855] minix_free_inode: bit 1 already cleared [ 475.279239] minix_free_inode: bit 1 already cleared [ 475.620974] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.627386] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.634928] device bridge_slave_0 entered promiscuous mode 00:24:52 executing program 7: r0 = socket(0x10, 0x20000000000003, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000400)=""/144, 0x27d}], 0x4, &(0x7f00000004c0)=""/63, 0x3f}}], 0x1, 0x0, &(0x7f00000027c0)) recvmmsg(r0, &(0x7f0000002800)=[{{&(0x7f0000000100), 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/9, 0x9}}], 0x1, 0x0, &(0x7f0000002980)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000003080)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000500)=0x1e) 00:24:52 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000498000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000830000)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) prctl$setmm(0x23, 0xf, &(0x7f0000df1000/0x6000)=nil) 00:24:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) r3 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x1ff, 0x80) ioctl$TCFLSH(r3, 0x540b, 0x3) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x8, 0x3ef, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x75, r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x4, 0x400001) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000400)={0x401, 0xfff, 0x8000, 0x4, 0x0, 0x8, 0x0, 0x8001, r1}, 0x20) sendto$unix(r4, &(0x7f0000000440)="07280e4d773a3f2f1c50a037e6d31175dde1a9d0a33b1a67a819cc9e62c23854b8378b89c7b249116ec64f39ac7f556147be1731c7f5ad46e8140da23b30fc175d7024e3dc9aa8734d665f4b8d1b3ab96b4f39", 0x53, 0x4000, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r2}) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r2}) r6 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="0a00001c2c766856c3d5b9fd45b091f531ab59449713744c435db3f477f731f0ebe12b878420a95ef9cbdb0adffb500b2e429f68c508fd84e9f461b598d436a6ae7f2d68c9756b1fccd3e4d68d69f2ff7a8ba756ecc2281e5274fc8ad156b38f2d21cdaa638d12ffe83ab7115c41202538f567deb7e2c73eb501000000335033c7d6e194db993d2fb85b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xb) r7 = semget(0x3, 0x0, 0x2e2) semtimedop(r7, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) 00:24:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 475.666648] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.673020] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.680374] device bridge_slave_1 entered promiscuous mode [ 475.993379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 476.129154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 476.217904] minix_free_inode: bit 1 already cleared [ 476.288151] minix_free_inode: bit 1 already cleared [ 476.325318] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 476.355175] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 476.463957] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 476.471404] team0: Port device team_slave_0 added [ 476.494612] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 476.502557] team0: Port device team_slave_1 added [ 476.525741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 476.532614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 476.544150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 476.562268] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 476.569153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 476.577368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 476.595924] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 476.603087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 476.612571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 476.633393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 476.640485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 476.648597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 476.881086] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.887479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.894170] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.900540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.908520] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 477.535070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 477.759270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 477.841672] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 477.922069] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 477.928212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 477.938811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 478.015134] 8021q: adding VLAN 0 to HW filter on device team0 00:24:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:55 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000300)={0xaa, 0x40}) read(r0, &(0x7f0000000200)=""/128, 0x80) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000248000/0x2000)=nil, 0x1000) write$binfmt_script(r0, &(0x7f0000000340)={'#! ', './file0', [{}, {0x20, '}'}, {0x20, "7b656d305b3a5d6d696d655f747970655c73797374656d13"}, {0x20, 'trusted/vboxnet0)'}, {0x20, 'em1'}], 0xa, "955644559bb6b92ea8fc73acf1fd641e537dff910d1ccfe2240e279b300522b1561419d4c1acbce6b56755ad71bd291d5c8ab448c50f1d577f4400638d666e2fee54abe6fa4e13ab4b86bfcc770a187a3796e346f59bd9299919c09656bc70719e38bdf8fd80c207bb12d2c32dbf23e160fe7353ebd1bfde021bdf15d93d0c162993e75611017a35b28e8a17c1b827849039c0137dee73036cfcc5279a37d149f775c408ada9f702882a5aa9ce8e1718a78ce078ffb39e2970e798f0bd4cd0e69aa615a7664ed51e3d50a920bfc7da8f821a54669ae0f7590d757914efa642623de27cc5bdba59c57d4599ef"}, 0x129) shmat(0x0, &(0x7f000006c000/0x3000)=nil, 0x7000) shmat(0x0, &(0x7f0000601000/0x3000)=nil, 0x5000) r1 = shmat(0xffffffffffffffff, &(0x7f0000005000/0x2000)=nil, 0x2000) shmdt(r1) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 00:24:55 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:55 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200401, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0xa, 0x0, @rand_addr}], 0x10) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x9, 0xff68) 00:24:55 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x100000001) getsockopt(r0, 0xff, 0x7, &(0x7f0000000000), &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x18) 00:24:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") socket$inet6(0xa, 0x1, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), &(0x7f0000000240)}}, &(0x7f00000002c0)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000000)=""/7, 0x7}], 0x1) r2 = gettid() ioctl$int_in(r1, 0x800000c0045003, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0xa0, "a48c61b00bad304c3c639f13b74ede031dd8647e6c570c534624959758505f6aa33137b963ac27ce22cb9a9edbfbae32dffb43126e1b150e0c48e95b2d2b4326e8c4bfb41a02cbf17877db76c33b385e54b51783436f6111a940dd7fa871f2bb44d85fb4c914b21d9e6b5967f91ef5561bfca3015abea64397d962c768996566adbf6e407351a0f8fea4395f8b9e00dfba9a787c20f0a75894e305f78030f076"}, &(0x7f0000000080)=0xa8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={r3, 0xf, "a77318f77a0637f315f0f7d6c649a2"}, &(0x7f0000000300)=0x17) tkill(r2, 0x15) write$P9_RGETLOCK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="28000000370200eaff7e000000000000ff07000000000000", @ANYRES32=r2, @ANYBLOB='\n\x00/dev\f\x00\x00\x00#\x00'], 0x28) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000340)={'filter\x00'}, &(0x7f00000003c0)=0x78) 00:24:55 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:55 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000600)=0xfffffffffffffff9, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x80000000007}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x58ff8f93, 0x801) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x3, 'veth1_to_bridge\x00', 0x4}, 0x18) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x8, 0xfffffffffffff801, 0x100000000, 0x2, 0xffffffffffffff01}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={r2, 0x72, "87d1c6cf25b3f126610de9f3189070ecc7866370a7b113c22404f99ce694376fe0665138c09b4926273bf4ea5b614a00cc80ad470ea0fd0f9098bbef06b1cd986de5cde61bbbc85306f7d58b9e65e030b84dbe4c06cef14309e49374e3fe28135198997708ee14b4b8c7ef1343ea7a3040d4"}, &(0x7f00000001c0)=0x7a) 00:24:55 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f0000000180)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00', &(0x7f0000000300)='fuse\x00', 0x5, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x111001, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000100)=0x8) 00:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001680)={'bridge0\x00', 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f00000000c0)=""/143) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'erspan0\x00'}}, 0x1e) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000240)={r2}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000000)={&(0x7f00000004c0)=@setlink={0x30, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x10, 0x2b, [@nested={0xc, 0x1, [@typed={0x8, 0x0, @fd}]}]}]}, 0x13}}, 0x0) 00:24:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}]}, &(0x7f000045c000)=0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) shutdown(r0, 0x2000000000000002) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={r1, 0x400, 0x2, [0x9, 0x5]}, 0xc) 00:24:56 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 479.018505] device bridge_slave_1 left promiscuous mode [ 479.024266] bridge0: port 2(bridge_slave_1) entered disabled state 00:24:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000340)=0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000280)=""/140) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000140)={{0x9, 0x7, 0x3, 0x0, 'syz1\x00', 0x6}, 0x2, 0x408, 0xe84f, r2, 0x2, 0x6, 'syz1\x00', &(0x7f0000000100)=['\x00', '))$systemmime_typewlan0em0/\x00'], 0x1d, [], [0x20, 0x2, 0x4, 0x9]}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x18) [ 479.103511] device bridge_slave_0 left promiscuous mode [ 479.109258] bridge0: port 1(bridge_slave_0) entered disabled state 00:24:56 executing program 5: r0 = shmget(0x2, 0x1000, 0x100, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x30180, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0x8d7, @local, 0x4}, @in6={0xa, 0x4e23, 0x100000001, @empty, 0x8}, @in={0x2, 0x4e22}, @in={0x2, 0x4e24, @remote}], 0x88) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000180)={0x7, 0x25, 0x6, 0x300}) r3 = mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x100, &(0x7f0000000200)={0x1, 0x80000001, 0x5b7, 0x2, 0xc4, 0x3, 0x8001, 0x3}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x100, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000002c0)={0x9, {0x2, 0x4e22, @local}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @loopback}, 0x200, 0x1f, 0x20, 0x4, 0x6, &(0x7f0000000280)='ip6gretap0\x00', 0x7, 0x9, 0x5}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000340)={r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x1, 0x5156}, 0x90) write$P9_RSETATTR(r1, &(0x7f0000000400)={0x7, 0x1b, 0x2}, 0x7) write$FUSE_DIRENT(r1, &(0x7f0000000440)={0xb0, 0x0, 0x8, [{0x0, 0x7f, 0x11, 0x3, '[+em1cgroupcgroup'}, {0x4, 0x6, 0x9, 0xfd, "65746830be75736572"}, {0x1, 0x5, 0xb, 0xff, 'ip6gretap0\x00'}, {0x5, 0x1, 0x2, 0x7ff, "cf2b"}]}, 0xb0) lseek(r3, 0x0, 0x1) write$P9_RSTATFS(r4, &(0x7f0000000500)={0x43, 0x9, 0x2, {0x6, 0xa60f, 0x800, 0x3ff, 0x4, 0x6, 0x0, 0x100000001, 0x7}}, 0x43) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f0000000580)) write$FUSE_NOTIFY_POLL(r4, &(0x7f00000005c0)={0x18, 0x1, 0x0, {0x7fff}}, 0x18) ioctl$TIOCSCTTY(r1, 0x540e, 0x101) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000600)={r2, @in={{0x2, 0x4e24, @local}}, 0xfffffffffffffe01, 0x1a, 0x0, 0x9, 0x4}, &(0x7f00000006c0)=0x98) r6 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$invalidate(0x15, r6) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000780)) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f00000007c0)) r7 = openat$cgroup_ro(r4, &(0x7f0000000800)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x3f, &(0x7f0000000840)=""/159, &(0x7f0000000900)=0x9f) shmget(0x2, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000940)={0x1d, 0x7, 0x3}) write$P9_RWALK(r1, &(0x7f0000000980)={0x16, 0x6f, 0x1, {0x1, [{0x44, 0x1, 0x1}]}}, 0x16) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000009c0)={r5, 0x4}, &(0x7f0000000a00)=0x8) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000a40)={0x7, {{0x2, 0x4e24}}, 0x0, 0x6, [{{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e23, @rand_addr=0xe4}}, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e22}}, {{0x2, 0x4e22, @multicast1}}]}, 0x390) 00:24:56 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x10001}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={r0, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000640)='cifs.idmap\x00', &(0x7f0000000680)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000006c0)="2e736563757269747976626f786e65743070726f63276e6f64657662646576b200", 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000700)='dns_resolver\x00', &(0x7f0000000740)='/dev/sg#\x00') sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) syz_open_dev$sndpcmp(&(0x7f00000009c0)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/sequencer2\x00', 0x100, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/null\x00', 0x8800, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/vsock\x00', 0x101800, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x10000007f, 0x200) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='eth0vmnet1\x00'}, 0x10) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000dc0)=""/153) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{0xd7, 0xaf}, {0x7fffffff}, 0x4}) socketpair$inet6(0xa, 0x5, 0x563c, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000780)=0x1e) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) io_setup(0xffffdfffffbf7ff8, &(0x7f0000000840)=0x0) io_cancel(r6, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x80000001, 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x101}, &(0x7f00000003c0)) connect$rds(r3, &(0x7f00000000c0)={0x2, 0x4e22, @loopback}, 0x10) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)) write$FUSE_INIT(r7, &(0x7f0000000580)={0x50, 0x0, 0x4, {0x7, 0x1b, 0x3211, 0x80000, 0x2, 0x1, 0x6, 0x5}}, 0x50) creat(&(0x7f0000000340)='./file0\x00', 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000004c0), &(0x7f0000000600)=0x8) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 00:24:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 479.464795] team0 (unregistering): Port device team_slave_1 removed [ 479.482572] minix_free_inode: bit 1 already cleared [ 479.538441] IPVS: ftp: loaded support on port[0] = 21 [ 479.612551] team0 (unregistering): Port device team_slave_0 removed [ 479.698052] minix_free_inode: bit 1 already cleared [ 479.716485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 479.717839] IPVS: ftp: loaded support on port[0] = 21 [ 479.737256] minix_free_inode: bit 1 already cleared [ 479.807032] bond0 (unregistering): Releasing backup interface bond_slave_0 00:24:57 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc6a}, 0x2c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80000, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0}, 0x3ca) 00:24:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:24:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 479.900457] bond0 (unregistering): Released all slaves 00:24:57 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="480000001400197f09004b0101248c5902d0ff0700446f1dd5e389e29ea75d3474206130570800000000ffffffe328eaaa213ee20600d4ff5bffff00c7e5ed5e00000000c8550000", 0x48}], 0x1) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/103, 0x67) 00:24:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x6, 0x5, 0x6}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) [ 480.268866] IPVS: ftp: loaded support on port[0] = 21 00:24:57 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0xffffffffffff4081, 0x8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x181080, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x5ebad107, 0x380, 0x800, 0x2}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0x7, 0x6, [0x2, 0x7fff, 0x0, 0x7ff, 0x1f, 0x7fff]}, &(0x7f0000000140)=0x14) 00:24:57 executing program 7: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000380)={0x5c, @loopback, 0x4e20, 0x1, 'nq\x00', 0x14, 0x1, 0x2a}, 0x2c) mount(&(0x7f00000014c0)='./file1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(r1, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x3f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x12) r3 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0xa) r4 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r4, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 00:24:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0xffffffffffffffff, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 481.075262] minix_free_inode: bit 1 already cleared 00:24:58 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x30000, 0x100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) open$dir(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 00:24:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 481.825086] minix_free_inode: bit 1 already cleared [ 481.832991] minix_free_inode: bit 1 already cleared [ 481.843449] minix_free_inode: bit 1 already cleared [ 482.764059] minix_free_inode: bit 1 already cleared [ 483.166576] minix_free_inode: bit 1 already cleared [ 483.579778] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.586262] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.594435] device bridge_slave_0 entered promiscuous mode [ 483.640161] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.646575] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.668788] device bridge_slave_1 entered promiscuous mode [ 483.719277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 483.762373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 483.887806] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 483.931276] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 484.126029] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 484.134804] team0: Port device team_slave_0 added [ 484.175217] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 484.182699] team0: Port device team_slave_1 added [ 484.226591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 484.270617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 484.304848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 484.342515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 484.661819] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.668258] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.674990] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.681387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.689336] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 485.407032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 485.555523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.643965] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 485.734492] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 485.740707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 485.749346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 485.833715] 8021q: adding VLAN 0 to HW filter on device team0 00:25:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:03 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:03 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80001, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000040)={{0x2b, @broadcast, 0x4e23, 0x4, 'sed\x00', 0x8, 0x80000001, 0x46}, {@broadcast, 0x4e24, 0x0, 0xfffffffffffffbff, 0x6, 0x100000001}}, 0x44) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"76657400023c900000000000bd6800", 0x43732e5398416f1a}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0xffffffff, 0x8, 0x8000, 0x6, 0x100, 0x21ac, 0x6, 0x400, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r2, 0x5}, 0x8) 00:25:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={0xffffffffffffffff, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r2 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x8) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x60) r2 = socket(0x10, 0x802, 0x0) sendmmsg(r2, &(0x7f0000008ec0)=[{{0x0, 0x0, &(0x7f0000001480)}}], 0x1, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x2) write(r2, &(0x7f0000001500)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0800100023020000", 0x24) 00:25:03 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x204000, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000380), &(0x7f0000000440)=0xc) fcntl$setflags(r1, 0x2, 0x1) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000300)=0x3, &(0x7f0000000400)=0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000a00)=0x18) write$binfmt_aout(r3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x196) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) dup(r2) sendfile(r3, r3, &(0x7f00000000c0)=0x6, 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@rand_addr, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000540)='./bus\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000006c0)="1ee9da3cecb80c954230469a7b7bd5e48e824a0a2fd10586479b2a56ba3155f50239d6ddc02d8cdd3b1c461edc1fee288cb6b4e6d291d3c76e788122b35689f5784417d00d3f76a2d7c445514e2490ba1ff8d3816a92499f74602eb6dd2608d2a3c3ad2d4347c528f934a03cef9a7f162c6e8fbd1604bc46e37fedd423fd873aea0ed50976a47408b9075fdab210cff8f34a40357ef36e", 0x97, 0x8}], 0x4, &(0x7f0000000980)={[{@fat=@uid={'uid', 0x3d, r4}}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}]}) accept$nfc_llcp(r0, 0x0, &(0x7f0000000240)) accept4$nfc_llcp(r0, 0x0, &(0x7f0000000140), 0x80800) ioctl$sock_proto_private(r3, 0x89e7, &(0x7f00000002c0)="d655eb54fb50cfcd24237cc1aa2b821e61cb94b774402840f2a2") 00:25:03 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000100)=['/dev/snd/controlC#\x00'], 0x13}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004600)={'team0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000004640)={0x10, 0x2, &(0x7f00000002c0)=@raw=[@call={0x85, 0x0, 0x0, 0x23}], &(0x7f0000000300)='syzkaller\x00', 0x94, 0x80, &(0x7f0000000340)=""/128, 0x41f00, 0x1, [], r1, 0x6}, 0x48) fgetxattr(r2, &(0x7f00000003c0)=@random={'trusted.', '(vmnet1nodev\x00'}, &(0x7f0000000400)=""/132, 0x84) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000006300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000006340)={@mcast1, 0x4f, r1}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r4, 0x4) 00:25:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = dup(r0) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1}}, 0x1e) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) close(r2) 00:25:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000064e000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000000)) shutdown(r2, 0x2) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x1a3280) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f00000000c0)={{0xff, @remote, 0x4e22, 0x0, 'dh\x00', 0x8, 0x3, 0x64}, {@broadcast, 0x4e23, 0x1, 0x200, 0xfffffffffffffffa, 0x3}}, 0x44) 00:25:04 executing program 7: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000016c0)={0x0, 0x0, @pic={0x9, 0x40bd, 0x34f, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9, 0x6, 0x81, 0x8001, 0x0, 0x0, 0x5}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x5d, &(0x7f0000000080), 0x0) mlockall(0x1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000600)={0x0, 0x1000000004}, &(0x7f0000000580)=0xc0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x101100) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0)=0x31, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000640)="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", 0xdc6) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) connect$packet(r2, &(0x7f0000001600)={0x11, 0x0, r3, 0x1, 0x6, 0x6, @dev={[], 0x11}}, 0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r4, &(0x7f0000000440)={'syz1'}, 0x12000) setsockopt$inet_buf(r2, 0x0, 0x28, &(0x7f00000017c0)="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", 0x800) 00:25:04 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) socketpair(0xf, 0xa, 0x3ff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x7, 0x20, 0x5, 0x3}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000002c0)={r3, 0x700, 0x30}, &(0x7f0000000300)=0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x201000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc80700") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control={0x0, 0x5}}], 0x30) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f00000000c0)={'syz_tun\x00'}) fchdir(r4) 00:25:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500), &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 487.403170] minix_free_inode: bit 1 already cleared 00:25:04 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000d41ed5f600682b5a42a3bf719957cf6e3a8e8f2fffdf7a9aabfb8b21896c67f65fbf27dad8a0a1590fcf04d0771519bab4eda2dbde2639f80634029a4ccd4f1dba0f989add3b68d877d97d56316baf59c51c25fd473d5376b4c44a", @ANYRESDEC, @ANYBLOB="00000000000000190a000100aaaaaaaa775ac612"], 0x5}, 0x1, 0x0, 0x0, 0x40}, 0x800) fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x401, 0x200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x1009}}, 0x20) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) 00:25:04 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 487.424600] minix_free_inode: bit 1 already cleared 00:25:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697806", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:04 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000300)={0x3}) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000240)=""/27) bind$alg(r1, &(0x7f0000219fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni-avx2\x00'}, 0x58) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000180)=0x2, 0x2) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000280)={0x9, 0x2, 0xff}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x1, 0x7f, 0x5}, {0x4, 0x8000, 0x8, 0x2}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000040)=0x10, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e24, 0x5, @mcast2}}, 0x6, 0x5, 0x40, "00d00eaa903a1f1c1bce11ab838ea20867a97f8d06cd197d86d1f961cbaee7c0e0969764c4f5735694cab0d9911b24e85bea2166922f8ecde3cf6aa5ed267b2d2a2ce882be32021bdceb3a124b6f4781"}, 0xd8) r3 = msgget$private(0x0, 0x18) msgctl$IPC_RMID(r3, 0x0) [ 487.457041] minix_free_inode: bit 1 already cleared [ 487.466219] minix_free_inode: bit 1 already cleared [ 487.482552] minix_free_inode: bit 1 already cleared 00:25:04 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x29, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x9, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x9, 0x20, 0x7, 0x7}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r2, 0x57, 0x7}, &(0x7f0000000300)=0xc) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40002, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000180)={0x31, 0x4, 0x0, 0x4, 0x6}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000040)=@ethtool_pauseparam={0x12, 0x800, 0x1, 0x9}}) 00:25:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000200)=0x54) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='cpuset\x00') r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x10000000000001d2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000240)='lo\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 487.964742] minix_free_inode: bit 1 already cleared 00:25:05 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 00:25:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:05 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000b2fe80), 0xb3, 0xfffffffffffffffc, 0x0) [ 488.253284] *** Guest State *** [ 488.257008] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 488.266356] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 488.275398] CR3 = 0x0000000000000000 [ 488.279451] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 488.285772] RFLAGS=0x0000b002 DR7 = 0x0000000000000400 [ 488.291954] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 488.298837] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 488.307188] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 488.315997] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 488.324220] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 488.332588] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 488.340771] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 488.349087] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 488.357288] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 488.365535] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 488.373662] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 488.381855] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 488.388612] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 488.396263] Interruptibility = 00000000 ActivityState = 00000000 00:25:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x12600, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x340, &(0x7f0000005b00)}}, {{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000005c40), 0x1f4, &(0x7f0000005c80), 0x3a00}}], 0x38c, 0x0) [ 488.402680] *** Host State *** [ 488.406000] RIP = 0xffffffff8120b174 RSP = 0xffff880189d17350 [ 488.412080] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 488.419175] FSBase=00007fc3b8494700 GSBase=ffff8801db000000 TRBase=fffffe0000003000 [ 488.427445] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 488.433620] CR0=0000000080050033 CR3=00000001c9892000 CR4=00000000001426f0 [ 488.440738] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff86c01380 [ 488.447636] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 00:25:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 488.453812] *** Control State *** [ 488.457535] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 488.464603] EntryControls=0000d1ff ExitControls=0023efff [ 488.470326] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 488.477495] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 488.484333] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 488.491018] reason=80000021 qualification=0000000000000000 [ 488.497524] IDTVectoring: info=00000000 errcode=00000000 [ 488.503185] TSC Offset = 0xfffffef8d852d0a6 [ 488.507741] EPT pointer = 0x000000018477201e [ 488.522075] minix_free_inode: bit 1 already cleared [ 488.664299] minix_free_inode: bit 1 already cleared [ 488.748089] minix_free_inode: bit 1 already cleared [ 488.763214] minix_free_inode: bit 1 already cleared [ 489.187253] minix_free_inode: bit 1 already cleared 00:25:06 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0xfff, 0xffff}, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r2, &(0x7f0000000080), 0x1a6) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x0, @empty, 0x0, 0x0, 'fo\x00'}, 0x2c) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) 00:25:06 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) fcntl$getown(r0, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)=0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0xfffffffffffffe82) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x214040, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xb2a2, 0x0, 0x3ff, 0x71}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000240)={r4, 0x2}, &(0x7f0000000280)=0x8) 00:25:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:06 executing program 6: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x400000000000002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"0000000000000000000000000200", 0x12}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010005fba00000000008e8ff3bd780a743ecc5700000000000004dc05509f28c81a705b82e6259005a8d034f7369400000000c876a77b2fb33b42dcc0fee3dd3236371fa4380cdf19a021b66b26dec47edd022cb41808d4d027b151328d9c296b48a473053cbee26ecffb2f53b0e9dcc9e42066f173c4b340c3a0037bf9729a2008228d25398517b16cc90f", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280)) write$binfmt_aout(r0, &(0x7f0000000080)={{0x500}}, 0x20) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000240)=0x1c) 00:25:06 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f23", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:06 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000010000/0x4000)=nil, 0x4000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r2 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180)="92deff64e6f01cbe6f2116409e3fd5a0a3c6b2d4a2", 0x15, 0xfffffffffffffff8) r3 = request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000340)='(em0\x00', 0xfffffffffffffff8) keyctl$search(0xa, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, r3) mount$9p_fd(0x0, &(0x7f00000000c0)='./control/file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="6d8468e85df0330e6eb30d8e991ba92c0005684643f6e5799d7b7195be3cef6da72eaa316bf62aa691936fd1a496dfd2c95e54cc03e47f2bbb81c2b8f06848"]) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) open$dir(&(0x7f00000001c0)='./control\x00', 0x80, 0x60) close(r0) 00:25:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000080)=r1) [ 489.698687] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 489.718320] Unknown ioctl 1074029063 [ 489.755233] 9pnet: Insufficient options for proto=fd 00:25:06 executing program 3: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0xfffffffffffffffc, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000480)) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x252, 0x82) r2 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x800, 0x0, 0x0, 0x101, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x7, 0x5, 0x0, 0xdf, 0x80, 0x1ce70000000, 0x75ea, 0x81, 0xa6, 0xdf3, 0x5, 0x9, 0xa2, 0x5, 0x4, 0x0, 0x0, 0xfff, 0x9, 0x2, 0x0, 0x1, 0x6, 0x0, 0x8, 0x0, @perf_config_ext={0xed7}, 0x404, 0x4, 0x2, 0x7, 0x8, 0x1000, 0x6}, r2, 0x0, r2, 0x1) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f00000001c0)) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x100000000, 0x5}) sendfile(r1, r1, &(0x7f0000000000)=0x39044, 0x2000005) [ 489.775849] Unknown ioctl 1074029063 [ 489.790147] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. 00:25:07 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = socket$inet(0x2, 0x80000, 0xfffffffffffeffff) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x8000) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000300)=[0x200000000001, 0x3]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='nv\x00', 0x2fc) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14, 0x80800) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, r5}, 0xc) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000180)) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000340)=0x3, 0x2d5) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x1ff) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x7dd, 0xf000000, @dev}, 0x10) [ 489.913535] 9pnet: Insufficient options for proto=fd 00:25:07 executing program 6: r0 = timerfd_create(0x100000000000008, 0x80000) timerfd_settime(r0, 0x0, &(0x7f0000016fe0)={{0x5}, {0x0, 0x5f6c}}, &(0x7f0000000080)) timerfd_gettime(r0, &(0x7f0000000000)) 00:25:07 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 489.984301] minix_free_inode: bit 1 already cleared 00:25:07 executing program 5: ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000001400)={"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"}) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x4000, 0x20) r1 = dup(r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0x1) accept$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x6, @remote}, 0x10) socket$rds(0x15, 0x5, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r4 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x8000000000) getdents64(r4, &(0x7f00000002c0)=""/4096, 0x1000) 00:25:07 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000050c0), &(0x7f0000005100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socketpair(0x1a, 0x5, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086610, &(0x7f0000000080)={0x7ff00, 0x80000, 0x10, 0x3}) 00:25:07 executing program 3: r0 = socket$inet6(0xa, 0x1002000000002, 0x0) ioctl(r0, 0x2d1, &(0x7f00000000c0)="075cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x2, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x2, 0x40200) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000340)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000380)="441f08e30700000000000000fe36cef3e26def23000200000011000013", 0x1d) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)=""/37, &(0x7f0000000040)=0x25) 00:25:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000000)=ANY=[@ANYBLOB="6714c555e70000000000000000"]) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) [ 490.291445] EXT4-fs warning (device sda1): ext4_resize_fs:1916: can't read last block, resize aborted [ 490.434985] EXT4-fs warning (device sda1): ext4_resize_fs:1916: can't read last block, resize aborted [ 490.543216] minix_free_inode: bit 1 already cleared 00:25:07 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x400400) setsockopt$sock_attach_bpf(r2, 0x84, 0x65, &(0x7f0000000140)=r1, 0x4) sendmsg(r0, &(0x7f000000e8c0)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000001980)}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000180)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)=']', 0x1}], 0x1, &(0x7f0000000580)}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x400802) 00:25:07 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x20, 0x2a2000) r1 = socket$inet6(0xa, 0x80002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0x7fffffff}, 0xfffffe9a, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x3f, 0x1, 0x3}, &(0x7f00000002c0)=0x10) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000a40)=""/166) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000b00)=ANY=[@ANYRES32=r3, @ANYBLOB="93a62600bdf48442e38d3ded939efcc39e0f0efc929b2065c6c03e9baa0a33726ea52d43bf6fb5ef648e3aa1792e078f582571ab6be02db8a6b2e285e5be31e0f8637972000000000000a288c19d81ed"], 0x389) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x10000, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000440)=@mangle={'mangle\x00', 0x1f, 0x6, 0x588, 0x1f8, 0x110, 0x110, 0x0, 0x110, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, &(0x7f0000000100), {[{{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x1f, 0x3, 0x2}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x8}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7, 0x9}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2f}}}, {{@ip={@loopback, @loopback, 0xffffffff, 0x0, 'ipddp0\x00', 'sit0\x00', {0xff}, {0xff}, 0x7e, 0x2, 0x8}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xb}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0x2}}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x800, [0x5, 0x1f, 0x80000000, 0x10000, 0x3f, 0x9], 0xffffffffffffff30, 0x3f, 0x1}, {0x7, [0xffff, 0x8238, 0x7, 0x101, 0x1f, 0x4], 0xbd8b, 0xfffffffffffffff8, 0x2}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e8) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1) timer_create(0x3, &(0x7f0000000400)={0x0, 0x4}, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) timer_settime(r5, 0x2, &(0x7f0000000340)={{r6, r7+30000000}, {0x0, 0x7}}, &(0x7f000004afe0)) [ 490.592426] minix_free_inode: bit 1 already cleared 00:25:07 executing program 7: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ftruncate(r0, 0x2081f5) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000029c0)) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xfffffeb3, 0x77, 0x0, 0x3}, 0xb) fallocate(r1, 0x0, 0x0, 0x5c0d) ioctl(r0, 0x1, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x8000, 0xca, 0x7fff, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r2, 0x100000000000, 0x20}, &(0x7f0000000140)=0xc) shmget$private(0x0, 0x2000, 0x78000080, &(0x7f0000009000/0x2000)=nil) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000740)={0x1000, 0x5, 0xffffffffffffffff, "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"}) 00:25:07 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000040)={0x3, [0x6, 0x80, 0x400]}, &(0x7f0000000100)=0xa) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000200)={0x7, 0x800, 0xa3, &(0x7f0000000140)="1004d48db6661e0069b6f3d82b1ffe03a99d9aaf1a82f18c162c182efb6e3dfd48add36ece7d59bcd1c87523c1483df19e4eee7f066df94f26f4edbb1a843e9327843ddfbd28ceee4c20fa94a52a5b99b0535ea9983778951c6370206d1a0d5fe29c2f4b31c5e854014defe757137bce1df2b9bc0e7882ff7ae5c3243e818453c133d37eda44dd8fdd5d8a471767548ba9233f2e725d12162f09c85e6f40bcc60f536d"}) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000480)={{0xa, 0x4e24, 0x100, @mcast2, 0x5}, {0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0xbe6d}, 0x9, [0x6, 0x1, 0x1, 0xffffffffffff0000, 0x2, 0x8a5, 0x40, 0x10000]}, 0x5c) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100544ee6000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 00:25:07 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000050c0), &(0x7f0000005100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socketpair(0x1a, 0x5, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086610, &(0x7f0000000080)={0x7ff00, 0x80000, 0x10, 0x3}) 00:25:07 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 490.699576] EXT4-fs warning (device sda1): ext4_resize_fs:1916: can't read last block, resize aborted [ 490.758165] minix_free_inode: bit 1 already cleared 00:25:07 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000050c0), &(0x7f0000005100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socketpair(0x1a, 0x5, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086610, &(0x7f0000000080)={0x7ff00, 0x80000, 0x10, 0x3}) 00:25:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30c28d0aa1522d469e05f7783030306ed7303030303030303030303030343030", @ANYRESDEC=0x0, @ANYBLOB="2c67f26f75705f69643d30ed2a2f4254d4c0fd0e15ec91b5256acf6ada1f23791e6e0c4a25363e9287df8953832692c6937abdee03406d50c45496092afc947dab761b443efe5bdc01b7caa26f5c8ee7f812cf", @ANYRESDEC=0x0, @ANYBLOB='\v\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="2744591cdbbfcb7927327ceeaba2335827d3a27a9d910cfcbc894ac1cf21b13af5473b70560f894c77de9a43fd6830a34f5f5c3c31e245c08083cfd64f1d55e5ca5b0cf6c7fdf6e0ff23106c824bb6ba4915fbb41808e8", 0x57}], 0x1, 0x0) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 00:25:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000440)) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000100)={0x5, 0x80000000, 0x8, 0x4, 0x6}) prctl$setfpexc(0xc, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680)={0x0, @multicast2, @rand_addr=0x76e}, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@broadcast, @in=@local, 0x4e24, 0x0, 0x4e21, 0x10001, 0xa, 0x20, 0x80, 0x33, r1, r2}, {0x6, 0xffffffffffffffc1, 0x4, 0x6, 0x6, 0x7fffffff, 0x7}, {0x10000, 0x80000000, 0x1, 0x9}, 0x2e, 0x0, 0x1, 0x0, 0x2}, {{@in6=@mcast1, 0x4d2, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x19}, 0x0, 0x3, 0x2, 0x8, 0x4, 0xdf}}, 0xe8) timer_create(0x7, &(0x7f00000002c0)={0x0, 0x4, 0x0, @thr={&(0x7f0000000400), &(0x7f0000000180)="1f2d34b4245e48f4fc1cf178a84456ad2b8b8d9419b72bd2ed2b3599e339a74b8e585257f4c5ec25583ce877eb426ad42281d874d4ebab658bad6cde3de969e2c0bf72e15c7d70ac4a43038d2c4722530aa317169e754b484058b2e22fdf6dd7d906aef55a519ef3fd2c95da0c9b16e4ac775c42a03b85"}}, &(0x7f0000000300)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r3) r4 = syz_open_pts(r3, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000698000)=0xe) syz_open_dev$vcsa(&(0x7f0000000640)='/dev/vcsa#\x00', 0x244b, 0x20000) close(r3) socket$kcm(0x29, 0x0, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000010c0)=@filter={'filter\x00', 0xe, 0x6, 0xbd0, [0x0, 0x20000640, 0x200008cc, 0x20000e44], 0x0, &(0x7f0000000280), &(0x7f00000016c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000000000000800000000f96c6f000000000000000000000000000065716c0000000000000000000000000076657468315f746f5f626f6e6400000076657468315f746f5f7465616d0000000180c2000000ffffffffffff000000000000ffff00ff00ff000070000000e000000028010000726564697265637400000000000000000000000000000000000000000000000004000000ffffffff49444c4554494d45520000000000000000000000000000000000000000000000240000000000000073797a310000000000000000000000000000000000000000000000000600000049444c4554494d45520000000000000800000000000000000000000000000000240000000200000073797a31000000000000000000000000000000000000000000000000060000000b00000004000000000473797a6b616c6c657231000000000000697036746e6c300000000000000000006966623000000000000000000000000069703667726574617030000000000000aaaaaaaaaaaaff00ffff00ffffffffffffff0000ffff00ff0000c4000000ec000000340100003830325f3300000000000000000000000000000000000000000000000000000008000000d400000805020000737461746500000000000000000000000000000000000000000000000000000004000000e00000004e4651554555450000000000000000000000000000000000000000000000000004000000ffff00006c6f6700000000000000000000000000000000000000000000000000000000002400000005504565529cfcaebde1d08ccb0c55c5b20d2c4447a34935e41f0a44e9e3ae00020000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000020000000f0000000000000008000000000000000000000000000000000069706464703000000000000000000000697036677265300000000000000000006703000000000000000000000000000003a049a29d95ffffff0000ffffffffffffff0000ffff000000009c020000c4020000f0030000627066000000e3000000000000000000000000000000000000000000000000000802000025000000020000000600000004002f0400000000ff010102000200000800ffcc09000000070002cc040000000000050781000000ff01ff0029aa000003000000f8ffffff0800090105000000090009d303000000010000010000000002008007e40800000000ff15529300000200330000000000fbff0700ce080000400000ff04000000090009070600000007007b4007000000070009ff06000000c3f7000272f700000001ff0900000000010000000000000005002303000000000100fa0800000000d6e705d5060000000000ff08c500000001007f2a0010000007000500f8ffffff0300ff06fdffffff09000401cf0d00000002020504000000feff0120060000000600ff010800000081002b00080000000700050001000100090000ccff00000080007f0432190000ffff034108000000ff030806000000000600007900000000400000060affffff08000603000000000200011308000000060001030500000005008e010000000008000008030000000200cd02070000000400020209000000050001000600000081ff09fd0400000000000909000000000200000000000000bd00000404000000070003ff04000000000000870600000001000040f40c0000400003f8245f00000002074c01000100000000ff010000000200095a00000000ff07098e01000000f8ff0305fcffffffff7fd50f070000000500f90700020000158d0000415544495400000000000000000000000000000000000000000000000000000004000000020000005345434d41524b0000000000000000000000000000000000000000000000000008010000010000000004000073797374656d5f753a6f626a6563745f723a6d7472725f6465766963655f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000029000000813773797a6b616c6c657230000000000000677265746170300000000000000000007663616e30000000000000000000000076657468315f746f5f626f6e64000000ffffffffffff00ffffffffff00000000000000ff00ff00ff0000c00000003001000058010000636f6e6e6c6162656c00000000000000000000000000000000000000000000000400000009000100636f6e6e6c6162656c000000000000000000000000000000000000000000000004000000c100020049444c4554494d455200000000000000000000000000000000000000000000002400000009009a000073797a3100000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000004000000ffffffff434c415353494659000000000000000000000000000000000000000000000000040000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000020000001100000012000000faff62707130000000000000000000000000626f6e645f736c6176655f31000000006966623000000000000000000000000069726c616e3000000000000000000000aaaaaaaaaaaaffffffa5ff00aaaaaaaaaaaaff00ff0000ff000070000000e0000000100100004e464c4f470000000000000000000000000000000000000000000000000000004c000000f46c000002000400000000001618da7628eacb91f36c35389bd73cc87661aad95d33b502a47a35cbb0ac6bf253d189e91f94bc90b7635d8fac4a0b6017bbb3e2c127147efe9b54afd4546edf646e6174000000000000000000000000000000000000000000000000000000000c000000aaaaaaaaaa0f0000feffffff030000000400000000f779616d300000000000000000000000006970365f76746930000000000000000064756d6d793000000000000000000000726f7365300000000000000000000000aaaaaaaaaabbff00ffff00ffaaaaaaaaaaaaff00ffffff0000009c000000c40000000c0100003830325f33000000000000000000000000000000000000000000000000000000080000008100000001010000415544495400000000000000000000000000000000000000000000000000000004000000020000004c454400000000000000000000000000000000000000000000000000000000002400000073797a310000000000000000000000000000000000000000000000001f0000000600000000000000000000000000000000000000000000000000000000000000000000000000000006000000ffffffff000000009413f1581f15e9f4394704a0a66bf1c98dfdc10b9a1adc4ba460b0bef37d7bd7fabd3276f88c545f14964419421ba95bdab9d5643345e3bcc51f1d1ee0116ba45d4c604b4fc631563d9d0232523480caa151e4e9a60e8e968d3416d7050c262f4732da46781c534dced2f4185bb68463d4ccff9120b0a0577f986d24a21d8e3530e11470ba931da4e74600ad51677a318d5a4b3c02196ac0b72354a33f34461f33feed7e71a8ca084ed44e08ef774d48501036c9867634389d8de07d6cf65c87cad9ecfc0ab23daf5cfa01e2f257d9cb4c9ed3ff0be1746c89ca7186358b5e0a4519554c924a8a81f87163541df817224a83ae59010ac57c7ca04ba9d080cc631fa53d0c9f5cf76e7876f60f2229cdaf7298547c3189d1db5b7c7eaa0cb1c7ad15c704ae484b8c71338859749623582ca8affe6e5d0b626c08d3d4e39ed4721c8ab4a2313ced97e37bc70cd3729f82"]}, 0xc48) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x4, 0x7f, &(0x7f00000004c0)="ccf0b761536e0d623d4413f83be34a4d520d897d698d11f742b8c050ff2b1af7c0c40559080874f0cfe412025ba415d3896b92a65947aed2c0b90ab1c53c6ae276cd40987f7e2d4419ffb7fe9c526d9ffd5e86079984f5397ff051909a48447aa152880f7e521140cdab0078efcb26b1c90c0dc2957476c8c69e148bbcbe26"}) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000480)={0xc, 0xffffffff, 0x5}) 00:25:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000575ff0)={&(0x7f0000333f88)={0x2, 0x3, 0x0, 0x2, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x40000000000006, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x20000000000005, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x50}}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x911}, &(0x7f0000000080)=0x8) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000200)={0x8bb, 0x7fff, 0x7ff, 0x4, 0x2}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000280), &(0x7f0000000240)=0xfffffe43) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x80000000, 0x2, 0x0, 0x3f, 0x4}, 0x14) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000100)=""/165, &(0x7f00000001c0)=0xa5) 00:25:08 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) sched_setaffinity(0x0, 0x1c6, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) fcntl$setown(r0, 0x8, r1) fsetxattr(r0, &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='\x00', 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000180)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000240)={0x68, 0x29, 0x2, {0x2, [{{0x1, 0x3, 0x3}, 0x0, 0x1ff, 0x7, './file0'}, {{0xc, 0x4}, 0xfffffffffffffff7, 0x3, 0x7, './file0'}, {{0x20, 0x4, 0x4}, 0x3ff, 0x3, 0x7, './file0'}]}}, 0x68) [ 490.948425] EXT4-fs warning (device sda1): ext4_resize_fs:1916: can't read last block, resize aborted 00:25:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:08 executing program 6: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x121, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 491.072321] minix_free_inode: bit 1 already cleared 00:25:08 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000100)={0x7, 0x2, 0x1ff, 0x9, 0xff, 0x20, 0x1}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0xa3011, r1, 0x0) [ 491.168219] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:25:08 executing program 6: readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/156, 0x9c}, {&(0x7f0000000480)=""/147, 0x93}, {&(0x7f0000000300)=""/165, 0x6}], 0x3) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x100000001, 0x40000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'veth1_to_team\x00', 0x0}) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f00000002c0)={r3, 0x2, 0x7fff, 0x2, 0x7, 0x1, 0x9}) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="2c04000000"], 0xc}}], 0xb, 0x0) r5 = dup(r0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000400)={0x2, [0x80000000, 0x9]}, &(0x7f0000000440)=0x8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev, @loopback}, &(0x7f0000000100)=0xc) connect$packet(r5, &(0x7f0000000140)={0x11, 0xc, r6, 0x1, 0x3ff, 0x6, @dev={[], 0xc}}, 0x14) 00:25:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init() creat(&(0x7f0000000140)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x80000002) read(r1, &(0x7f0000000000)=""/177, 0x10) creat(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 00:25:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="bbbc283a"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4000, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f01"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:25:08 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f0000f7ffa8)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, &(0x7f0000fb3fa9)=""/87, 0x57}, 0x0) unlink(&(0x7f0000001240)='./file0\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmsg$key(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000012c0)=ANY=[@ANYBLOB="020f08000300000025bd700000000000010009000000000041a479949cb9f041c8ecaf3d374fb5bbd65d9def6c5006047d5add793d5e92d2bb87adbfe916dfae7d85fbf255238ffbdcf213b7c4006a7c7ba7e07155d67452cd93dfc974b3bc2219a3e5918dffcb3a5c93004d273f6b86ed483682e0325a7b0ac53753eee3679607a07eac04f198de3fc1e49bc896381e7112cc17bcc109a4f331996b46693893d1675837d1acfaf412a824ace5c0d949a1e3e7"], 0x18}}, 0x40) 00:25:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 491.486655] minix_free_inode: bit 1 already cleared 00:25:08 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) truncate(&(0x7f0000000000)='./file0\x00', 0x7fff) 00:25:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 491.899148] minix_free_inode: bit 1 already cleared 00:25:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="bbbc283a"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4000, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f01"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:25:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000001600)='/dev/vcsa#\x00', 0x7fff, 0xa8280) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000001640)) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000180)=[{0x6}]}, 0x10) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000340)=""/232, &(0x7f0000000300)=0xe8) 00:25:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 491.996153] minix_free_inode: bit 1 already cleared [ 492.003496] minix_free_inode: bit 1 already cleared 00:25:09 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080)={0x1, 0x5}, 0x8) shutdown(r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x800, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x9, 0x4) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x9, 0x2) r2 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x20) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f00000000c0)={0x0, 0x0, @ioapic}) [ 492.491676] minix_free_inode: bit 1 already cleared 00:25:09 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) sched_setaffinity(0x0, 0x1c6, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) fcntl$setown(r0, 0x8, r1) fsetxattr(r0, &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='\x00', 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000180)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000240)={0x68, 0x29, 0x2, {0x2, [{{0x1, 0x3, 0x3}, 0x0, 0x1ff, 0x7, './file0'}, {{0xc, 0x4}, 0xfffffffffffffff7, 0x3, 0x7, './file0'}, {{0x20, 0x4, 0x4}, 0x3ff, 0x3, 0x7, './file0'}]}}, 0x68) 00:25:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x4) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$ext4(&(0x7f00000000c0)='?\x00t2M', &(0x7f0000000200)='./file0\x00', 0x80, 0x196, &(0x7f0000000140)=[{&(0x7f0000000440)="0001000000ff000000000000c9000001000800000011cc0a56d4a9a75900000020000000010000000000006e5fbe5c0000ffff53ef010003", 0x38, 0x400}], 0x40000, &(0x7f0000000180)) 00:25:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000000c0)={0x7b}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)={0x1, 0x0, [{0x0, 0x4, 0x0, 0x0, @adapter}]}) 00:25:09 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}, &(0x7f0000000200)) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x1f}}, 0x18) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000004f000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="26410f300f01c90f06643e400f01c9420f758e000000002ef3400fb8e566baf80cb8ac8abd80ef66bafc0cedd2fe0f01ca66ba4000ec", 0x36}], 0x1, 0x0, &(0x7f00000001c0), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0xaaaaaaaaaaaaab4, 0x0, &(0x7f0000000140), 0x3c7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f00000001c0)="0f0f280dbaf80c66b8561eac8666efbafc0cecd8d80f01720cbad10466ed26900f019d848066b92902000066b80800000066ba000000000f300f01d10f013b", 0x3f}], 0x1, 0x0, &(0x7f0000000300), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xb69, 0x2081) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x93, "435a858b7cc1617a4561cb9ff1a159f05da428e0c8ed044d8233e8dd1ea92592305278d0797dce572a142bff4cd79910835a2b5d91943312bba6ef131ddfb2ed71a210dd031b9bce31ecb511b14ae59d76934582eea4c88c20ae61099633011bf6dba1cd6b118d1158883335dbb38bfade6c75f378b2d0c7d5454b9e914757c50c0d04330256d1a8b7e399a65d5c368a014af9"}, &(0x7f0000000080)=0x9b) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000140)={r5, 0xa334, 0x10, 0x5, 0x200}, &(0x7f0000000280)=0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) write$eventfd(r4, &(0x7f00000000c0), 0xffffff90) 00:25:09 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='/dev/fuse\x00', 0xffffffffffffff9c}, 0x10) r1 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), r1, &(0x7f00000004c0), 0x8000, 0x3) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r3 = dup(r2) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0), 0xffffffffffffffba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e23, 0x7, @remote, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000980)=0x52) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000009c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0900000000ff00000000"], &(0x7f0000000a00)=0xe) lookup_dcookie(0x6, &(0x7f00000008c0)=""/170, 0x23f) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r6 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) connect$inet6(r6, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r7 = socket$l2tp(0x18, 0x1, 0x1) r8 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r8, 0x8924, &(0x7f0000000000)={'bond0\x00', @ifru_settings={0x1, 0x8, @fr_pvc=&(0x7f0000000040)}}) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmsg$nl_crypto(r7, &(0x7f0000000200)={&(0x7f00009dd000), 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10}, 0xffd5}}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8937, &(0x7f0000000000)={'bridge{\t\x00\x00\x00e_1\x00', @random="01003a1e2410"}) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000580)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in=@broadcast}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000005c0)={0x9, 0x108, 0xfa00, {r9, 0x91, '/yi', "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"}}, 0x110) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000700)={0x7, 0x8209, 0x5, 0xf615, 0x0}, &(0x7f0000000740)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000780)={0x4, 0x6, 0x200, 0x7ff, 0xfff, 0x6, 0x8, 0x68b, r10}, 0x20) 00:25:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000fb0200000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) 00:25:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 492.889656] minix_free_inode: bit 1 already cleared 00:25:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x200000) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x40000003}) timerfd_settime(r3, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_pwait(r2, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000100)=0x20, 0x4) dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000021ff4)={0x2001}) fsetxattr(r3, &(0x7f0000000000)=@random={'btrfs.', '\x00'}, &(0x7f0000000040)='\\\x00', 0x2, 0x0) 00:25:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e6978ff", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 493.140991] minix_free_inode: bit 1 already cleared 00:25:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x61) r1 = open(&(0x7f0000000080)='./file0\x00', 0xc0000, 0x4) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)={[{0x5, 0x3f, 0x1, 0x9, 0x401, 0x7, 0x9, 0x1, 0x4, 0x400, 0x672, 0x93e, 0x10001}, {0x4, 0x523, 0x3, 0x5, 0x1, 0x0, 0x5, 0x1, 0x9, 0xff, 0xb47, 0x6, 0xf9}, {0x100000000, 0x7, 0x4, 0x46, 0x101, 0x2, 0x1, 0x440b, 0x80, 0x6, 0x7fffffff, 0xffffffffffffeb58, 0x10000}]}) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xffffffffffffffbd) ftruncate(r0, 0x100) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r2 = syz_open_pts(r0, 0x210800) ioctl$TCSETS(r2, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x100000001, 0x0, 0x4, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7, 0x3f}) 00:25:10 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff7}, &(0x7f0000000080)=0x9c) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000180)=[0x7, 0x1]) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x60, &(0x7f0000000100), 0xc) mmap(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(r4, 0x401070ca, &(0x7f0000000140)={0xe1, 0x7, 0x1}) close(r2) close(r0) 00:25:10 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='/dev/fuse\x00', 0xffffffffffffff9c}, 0x10) r1 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), r1, &(0x7f00000004c0), 0x8000, 0x3) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r3 = dup(r2) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0), 0xffffffffffffffba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e23, 0x7, @remote, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000980)=0x52) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000009c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0900000000ff00000000"], &(0x7f0000000a00)=0xe) lookup_dcookie(0x6, &(0x7f00000008c0)=""/170, 0x23f) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r6 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) connect$inet6(r6, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r7 = socket$l2tp(0x18, 0x1, 0x1) r8 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r8, 0x8924, &(0x7f0000000000)={'bond0\x00', @ifru_settings={0x1, 0x8, @fr_pvc=&(0x7f0000000040)}}) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmsg$nl_crypto(r7, &(0x7f0000000200)={&(0x7f00009dd000), 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10}, 0xffd5}}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8937, &(0x7f0000000000)={'bridge{\t\x00\x00\x00e_1\x00', @random="01003a1e2410"}) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000580)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in=@broadcast}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000005c0)={0x9, 0x108, 0xfa00, {r9, 0x91, '/yi', "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"}}, 0x110) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000700)={0x7, 0x8209, 0x5, 0xf615, 0x0}, &(0x7f0000000740)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000780)={0x4, 0x6, 0x200, 0x7ff, 0xfff, 0x6, 0x8, 0x68b, r10}, 0x20) 00:25:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, r1}}, 0x48) close(r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x10001, 0x0) r3 = semget$private(0x0, 0x4, 0x501) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f0000000240)=""/192) getdents(r2, &(0x7f00000001c0)=""/124, 0x7c) 00:25:10 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/184, 0x3b9) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18b0400000000000000db2406b208d37ed01cc0", 0x4c}], 0x1}, 0x0) 00:25:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x6) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)) 00:25:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0xffffffffffffffff, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 493.675127] minix_free_inode: bit 1 already cleared 00:25:10 executing program 0: r0 = accept(0xffffffffffffff9c, &(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000440)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000480)={0x7, 0x80000001, 0xc, 0x0, 0x61008b0c, 0x9, 0x0, 0xd69, 0x0}, &(0x7f00000004c0)=0x20) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000840)={0x6, 0x9}) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) utimes(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000640)={{}, {r3, r4/1000+10000}}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000500)={r1, 0x49, "cc7e292b700504dad97b3ee70a40193d14395d6b95cca45bce6c6490238dcfb484ec6e56e317d9ba217e5cc3e1e88501e34232880911ad16c38283282b08ee4487d89054f9bb5d038a"}, &(0x7f0000000580)=0x51) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000300)}], 0x28, &(0x7f0000000000)) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0/file0\x00', 0x80000001, 0x2, &(0x7f0000000300)=[{&(0x7f0000000140)="048f2c5e01bcb5575770ce7d9aabec82e86757ccdd127ae2a9dff8d31155afdee89c44ca311460c804c881221effae8190a41d397e3974a8db75d85e4f5349141547b0655c915ea5c605f1e0c35f03ab779df5ca03c80139416e86feaf8cb6ded32fe4aeaf91050ac8b7245937a5fb708c399fc69061b78d10cd218138a0f654a5db92e1ca680a47ee2a1f8c8f0cecbe9ee3fd", 0x93, 0x5}, {&(0x7f0000000200)="35aae5ed7e884782b93989eb68dc543c12db4bdca7afab91e8a055ddfd054e0a8e9ebe7342bfe1c4d39f47136c1fca126a58da736563fda640da62d63aa88da8c834295051ace9a4e2a5640fe87dc3ee3683ff18d6d23f4f2dbc5f08d85ff66fc5da40893795671e1e7d46bbdf02407cf6e3162c606fd434ffa6a2f6fb1570bbb0d5dec77e247b03c72b591e96accc460e1fa93513577a22d2f81f0d782cf6d1aca58621c106d4bcfc782604c8571b0bbade5ea100baa8f5418384c6b29cdf8cec8c20fe2854", 0xc6, 0xc0}], 0x8, &(0x7f0000000340)='(nodev/\x00') r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000007c0)={&(0x7f0000000680), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, r5, 0x0, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x801) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 00:25:11 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x78, 0x0, [0x40000020]}) 00:25:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000580)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000040)=0x80000000001, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xeffdffff00011000, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) io_setup(0x1, &(0x7f0000000140)=0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3, 0x400) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="fa000000940da936315f365fba3f422491cc331c22ed9969e7bc53242c8677c7c49628201fdae2f7bf2b041d9fe110cae1c4105b27b26dde35d5d804d3372fa770a38b339c690be36673bfc0515878f26cd982abf05b98925a8fc3d313ec2e1605558706749f1e5cdd4211d4bb8e3d0fbdda05e203f839887ecd4ffdf902828927c308e9899c4f03efde5d1f34c88cf9182315a7f79b7b235f9c97006dfa66c4375b346381626f2910d4c1372f5a364bd1470864b948eb99425c39d2d1b699fece8a42f68a3af2ac12dadd27e552e02b68a33ddfbf55692c064215b75f471837111dc2f580922113400026b76b7e3e1400f9e7c8edc4eb"], &(0x7f0000000100)=0x102) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000001c0)={r3, 0x6}, 0x8) r4 = fcntl$dupfd(r0, 0x0, r0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000180)="df", 0x1}]) 00:25:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xac, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket(0x0, 0x0, 0x0) 00:25:11 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x2800, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000002c0), 0x4) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000140)) r1 = semget$private(0x0, 0x3, 0x0) semtimedop(r1, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) write$sndseq(r0, &(0x7f0000000200)=[{0x0, 0x80000001, 0x100, 0x5, @tick=0x4, {0x2, 0x3}, {0x4, 0xeff6}, @control={0x4, 0x4}}, {0x9, 0x4, 0x2, 0x0, @tick=0x8, {0x2, 0xffffffffffff7fff}, {0x40, 0xffff}, @result={0x800, 0xc83d}}, {0x9, 0xf548, 0x6, 0x5, @tick=0x5, {0x1ff, 0x3ff}, {0x0, 0x2}, @raw32={[0x6, 0x7, 0x1]}}, {0xfffffffffffffff7, 0x1, 0x6, 0xfffffffffffffffa, @tick=0x2, {0x161ad2d9, 0x9}, {0x80}, @note={0x100000, 0xc30, 0xfff, 0xffffffffffffffcf, 0x1ff}}], 0xc0) r2 = socket$inet6(0xa, 0x40000080803, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x8c) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000180)={0x1ff, 0x2, 0x0, 0xfffffffffffffffe, 0x7, 0x6, 0x9, 0xfff}) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) r4 = accept4(r2, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f00000001c0)=0x2) 00:25:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9eb", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 494.083286] minix_free_inode: bit 1 already cleared 00:25:11 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="92edb1463e3d64cf038ee0cfbf760e0d", 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fchdir(0xffffffffffffffff) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000300)=0x3, &(0x7f0000000400)=0x4) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140), &(0x7f0000000a00)=0x18) write$binfmt_aout(r3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x1af) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = gettid() lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000680)='./bus/file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000d00)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f00000009c0)=0xe8) r10 = getegid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000e00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000e40)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000f40)=0xe8) getgroups(0x2, &(0x7f0000000f80)=[0xffffffffffffffff, 0xffffffffffffffff]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000fc0)=0x0) r15 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001000)={0x0, 0x0, 0x0}, &(0x7f0000001040)=0xc) sendmsg$unix(r3, &(0x7f00000011c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)="fb8a3aca2e3df15d5e0e5e7448e1d92b1305e03887ae89617f6167b9bafa5c7ab2abd86618fba9f00b65955b52d05b079788f3ee0812a95475ef3132f7c30d6f90d9eea63e8273bb9d53d9d682dc5647dae1b9f24191e43a14ee39724656eda3697a5edb9573ea92987acdba4101f84723b0", 0x72}], 0x1, &(0x7f0000001080)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x18, 0x1, 0x1, [r3]}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}, @rights={0x30, 0x1, 0x1, [r3, r4, r0, r1, r1, r3, r2]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x18, 0x1, 0x1, [r3]}, @rights={0x18, 0x1, 0x1, [r1, r1]}], 0x110}, 0x4080) r17 = dup(r1) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@rand_addr, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000540)='./bus\x00', 0x100, 0x1, &(0x7f00000007c0)=[{&(0x7f00000006c0)="1ee9da3cecb80c954230469a7b7bd5e48e824a0a2fd10586479b2a56ba3155f50239d6ddc02d8cdd3b1c461edc1fee288cb6b4e6d291d3c76e788122b35689f5784417d00d3f76a2d7c445514e2490ba1ff8d3816a92499f74602eb6dd2608d2a3c3ad2d4347c528f934a03cef9a7f162c6e8fbd1604bc46e37fedd423fd873aea0e", 0x82, 0x8}], 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="75ce2fb3", @ANYRESHEX=r18]) accept$nfc_llcp(r17, 0x0, &(0x7f0000000440)=0xffffffffffffff40) 00:25:11 executing program 5: personality(0xe040003) 00:25:11 executing program 3: socket$inet6_sctp(0xa, 0x100000000001, 0x84) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @local, 0xfff}}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000240)=0x98) 00:25:11 executing program 6: socket$kcm(0x2, 0x2000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) 00:25:11 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f00000000c0)="27ec8dabd3d015b1f61006144e500ac8eefbf75f16ec38080032a6bfea9eb314701d544d9be1d93566f84b891902d092c9e26d75b52f5e3f", &(0x7f0000000100)=""/212}, 0x18) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='\x00'}, 0x10) recvfrom$llc(r1, &(0x7f0000000300)=""/233, 0xe9, 0x40000021, &(0x7f0000000400)={0x1a, 0x337, 0x1, 0x200, 0x5, 0x27a6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x6, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r2, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000440)={0x9c, 0x6}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r2, &(0x7f0000000200)}, 0x10) 00:25:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400, 0x18) connect$bt_l2cap(r0, &(0x7f0000000240)={0x1f, 0x6, {0x3f, 0xffffffffffffffc0, 0x3f, 0x4, 0xc9eb, 0x4}, 0xfffffffffffffffd, 0x2}, 0xe) r1 = socket(0x40000000002, 0x3, 0x2) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x28a) recvfrom$inet(r1, &(0x7f0000000080)=""/181, 0xb5, 0x0, &(0x7f0000000140)={0x2, 0x0, @rand_addr}, 0x70d000) getpeername$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000000)=0x6e) 00:25:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000740)=0x20000000000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, &(0x7f0000000100)) 00:25:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/connector\x00') ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x2, 0xb, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="021200001100000026bd7000bcdbdf250100140079000000080012002580eafa211903000000000000003800000006003200030800000900000000000000ac1414bb000000000000000000000000ac14140c00000000000000000000000004000400050000001f000000000700003f00000000000000030000000000000002000b00050000000900"], 0x88}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000117, 0x0) 00:25:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xffff) ioctl(r0, 0x7e, &(0x7f0000000480)="0a68c80f003f3142e1f66fb4f630493ab834b8ea76e2bdce336b1d9b7e4134e01c5c0210a8ff0ce502562af4a6c9c9776d7586b629182db5571a50826913cd9dacea9526b5a63115214cd08ffb39777fbefcd71826208a9d4de7be51d4ea3129b930dcb49b42492d4bc65eab9cdba00d02977aaa6808000000384b9785624bb70d43e3b1285c22b864acd5260d1fe0d1791e6a9a1ebbc6a69e289561b141d30d75a44939c131f56ba35528e345889e83d0f5a276fbaabc579f56fa103af6cd397cd02424ac1a97c357ddce9379080231102ced347122c62385ce0300636958c6a7ba8da8d8000000000000000000") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$int_in(r0, 0x5456, &(0x7f0000000280)=0x80000001) r2 = dup3(r0, r0, 0x80000) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000000), 0x2) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xfffffffffffffc31, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800000012000d06000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000003ae2080000f000000000420b7d4e722d562da045b1109bf9d6f4642980f3920aed3c88338ecc08e365c7cec607bffcbb3b1e9d7492a843fcf57b4aaa504039476e798357478d7d7fc6e301a367b2f297ac9594ff216c1846444ad750f95619c694e2cba6f30111f352869f5792d7519a5ac2d557ae547b6a29d527f4a03b2c630961439e3c5e7100bb348678769c93b32a6e8f41f3b510e5af2f41bc4a9689066fd2c7545e3006531ab8daf7b75d556291af20006ac4bc7aee42a773a34776266217b2da72117c0dd961104b7089dcc228bc97c39f4aea99f12193266b5c9b6131f1933c3bd17b0d9cb5d5b9b7bf"], 0x28}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xd8cda8761099ce68}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0x158, r3, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1d}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8000}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x800}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x3f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 00:25:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x400, 0x0) accept$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) uname(&(0x7f0000000240)=""/185) 00:25:11 executing program 7: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, &(0x7f00000000c0), &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x220) 00:25:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x0, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 494.817651] minix_free_inode: bit 1 already cleared [ 494.826272] minix_free_inode: bit 1 already cleared 00:25:12 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) fchdir(r0) dup2(r2, r0) 00:25:12 executing program 5: r0 = bpf$MAP_CREATE(0x14, &(0x7f0000000280)={0x0, 0x0, 0x2}, 0x2c) r1 = dup3(r0, r0, 0x80000) connect$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 00:25:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:12 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400000000000, 0x4800) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x3) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000000), &(0x7f0000000040)=0x4) 00:25:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x80000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x5457, &(0x7f0000000640)) 00:25:12 executing program 3: r0 = mq_open(&(0x7f0000000640)='eth0\x00', 0x42, 0x0, &(0x7f00000001c0)) rt_sigprocmask(0x1, &(0x7f0000000080)={0xffff800000000000}, &(0x7f00000000c0), 0x8) rt_sigprocmask(0x0, &(0x7f0000000000)={0x8}, &(0x7f0000000040), 0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x105400, 0x0) accept$nfc_llcp(r1, &(0x7f0000000240), &(0x7f00000002c0)=0x60) ftruncate(r0, 0x6) 00:25:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r0, r1, 0x80000) [ 495.302105] minix_free_inode: bit 1 already cleared 00:25:12 executing program 7: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) connect$rds(r0, &(0x7f00000002c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$getregset(0x4, r1, 0x0, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0xd7}) semget(0x3, 0x0, 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)="6365706800e9939d7656b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0177bc8f8d8bc8f9d30f9c55ced1150431a9b1a839bbf3fe67d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635", 0x1002, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000280)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) move_pages(r1, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil], 0x0, &(0x7f0000000180)=[0x0], 0x6) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mount(&(0x7f0000000380)='.', &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x9) fallocate(r0, 0x0, 0x0, 0x1000f4) 00:25:12 executing program 6: r0 = socket(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x7fffffff, 0x8, 0x0, 0x38d8}, 0x10) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x79, "537e70fbc164a7fcca7c41b625f120567554843564374262064dad1c8c9266fb82a56feace9d0441f88c5103e1cd4723e6b7fe13ac59c0bc4da19b39ec04adf3a039603c003b0ce51c7ee2e674b9003ef4cec15e19397e4afec9bbbb7e1f843674aa1c8b98e329a40e7a4fa9e2f5338053a1fca594fc544280"}, &(0x7f0000000180)=0x9d) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 00:25:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x0, 0x0, @remote, @empty={[0x89ffffff]}, {[], @gre}}}}}, &(0x7f0000001640)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x1007d, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) 00:25:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4000, 0x0) 00:25:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000400)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bad5f, &(0x7f0000000300)=[{}]}) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174) 00:25:13 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7afef485, 0x200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='\x00\x00\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffc) 00:25:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x800, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 00:25:13 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x0) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:13 executing program 6: r0 = syz_open_pts(0xffffffffffffffff, 0x400400) signalfd(r0, &(0x7f0000000000)={0x1}, 0x8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x1, 0x0, 0x36115e9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r5 = getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000280)=0xe8) r7 = getgid() semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000002c0)={{0x3, r4, r5, r6, r7, 0x4, 0x1f}, 0x3, 0x6, 0x5}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) [ 495.873431] minix_free_inode: bit 1 already cleared [ 495.882195] minix_free_inode: bit 1 already cleared 00:25:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80003ffe}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)=@bridge_getneigh={0x0, 0x1e, 0x20, 0x70bd29, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x40, 0x10000}, [@IFLA_NET_NS_FD={0x0, 0x1c, r0}]}, 0x7}, 0x1, 0x0, 0x0, 0x4000042}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x40, 0x0, 0x3}}, 0x14) 00:25:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:13 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="58281e3bf8037ab31cb14247e9f922be7a8db6159ac14194a3415b30a8086f83d939e786064e5692391437bf53486f29518efca071f17ce47bd1dd041c00000000007bc2e9447b589cbeef29274a9c9956ea33b111ffdf2f3a176a59e83d46454769aa8d7e33bbe279d58f093636d54ba07e338cdd4a339fbc84bd067fc49fa61c3494c22ed85ccb27af88b90efdeac94a7a793a271033e45a8dac12fa0ad32a88f5b2a0", 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0xae, 0x200, 0x1, 0x1, 0x6, 0x6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback}}, 0x806, 0x7, 0x7f, 0xffffffff}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0x0, 0x3ff, 0x8001, 0xffff, 0x4}, 0x14) 00:25:13 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x85fb, 0x22000) sync_file_range(r0, 0x4, 0x6, 0x2) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000040)={0x3, 0xb32e}) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f00000003c0)) 00:25:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000200)={0x7, 0x9}) syz_read_part_table(0x0, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)="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", 0x200}]) 00:25:13 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, r1) r3 = open(&(0x7f0000000140)='./file0\x00', 0x80040, 0x8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000500)={'mangle\x00'}, &(0x7f0000000380)=0x54) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, 0x0) r4 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000180), &(0x7f0000000680)='L', 0x1, r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}}}, &(0x7f0000000440)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) capset(&(0x7f0000000340), &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0, 0x9}) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r5, r5, r4}, &(0x7f0000000280)=""/132, 0x84, 0x0) 00:25:13 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000440)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=0x20b, 0xffffffffffffffb5) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x1, @rand_addr}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000e0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80000000, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000640)) setpgid(r3, r3) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000006c0)=0xfffffffffffffe74) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000740), &(0x7f0000000480)=0xfffffffffffffe5f) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x0, 0x2000, 0x43, &(0x7f0000ffc000/0x2000)=nil) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") unshare(0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)={0xff0f}, &(0x7f0000000200)=0x10) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000700), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000000680), 0x2) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) [ 496.311176] minix_free_inode: bit 1 already cleared [ 496.351409] Unknown ioctl 1074835115 [ 496.373547] Dev loop5 SGI disklabel: csum bad, label corrupted [ 496.379698] Dev loop5: unable to read RDB block 1 [ 496.384750] loop5: unable to read partition table 00:25:13 executing program 6: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) socket$packet(0x11, 0x2, 0x300) capset(&(0x7f0000000180)={0x20080522}, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000006500), 0x2c7, 0x0, &(0x7f0000006700)) 00:25:13 executing program 0: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) close(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0xb7b8679bf11979eb) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000180)=""/4096) [ 496.464968] Unknown ioctl 35075 [ 496.469269] loop5: partition table beyond EOD, truncated [ 496.469323] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 00:25:13 executing program 5: socket$inet6(0xa, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='smaps\x00') r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") sendfile(r0, r1, &(0x7f0000000280)=0x62, 0x2000000004) ioctl$TIOCGPTPEER(r0, 0x5441, 0x6) [ 496.605629] Unknown ioctl 1074835115 [ 496.651124] Unknown ioctl 35075 00:25:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697810", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:14 executing program 6: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5b0, 0x10000) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x8000, &(0x7f00009ecff8)=0x77f, 0x2, 0x3) madvise(&(0x7f00008ed000/0x4000)=nil, 0x4000, 0x9) pkey_alloc(0x0, 0x0) 00:25:14 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000000), 0x0, [], [0x4, 0x0, 0x0, 0x8]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x42, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f00000000c0)={{0xff, 0x6}, 'port0\x00', 0x9, 0x0, 0xffff, 0x2c, 0x5, 0x7f80000000, 0x2, 0x0, 0x0, 0x5}) r2 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000240)={{0x3, 0x3, 0x100000001, 0x7ff, '\x00', 0x400}, 0x3, 0x100, 0x800, r2, 0x1, 0x1, 'syz1\x00', &(0x7f0000000000)=['/dev/full\x00'], 0xa, [], [0x100000000, 0x9, 0x0, 0x5]}) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) 00:25:14 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000440)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=0x20b, 0xffffffffffffffb5) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x1, @rand_addr}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000e0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80000000, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000640)) setpgid(r3, r3) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000006c0)=0xfffffffffffffe74) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000740), &(0x7f0000000480)=0xfffffffffffffe5f) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x0, 0x2000, 0x43, &(0x7f0000ffc000/0x2000)=nil) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") unshare(0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)={0xff0f}, &(0x7f0000000200)=0x10) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000700), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000000680), 0x2) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) 00:25:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x3, 0x2, 0x20) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 496.915735] minix_free_inode: bit 1 already cleared [ 496.934156] minix_free_inode: bit 1 already cleared [ 496.991724] Unknown ioctl 1074835115 00:25:14 executing program 5: unshare(0x40600) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x1000000080000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) r2 = signalfd(r0, &(0x7f0000392ff8), 0x8) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$RTC_VL_CLR(r3, 0x7014) r4 = dup(r2) unlinkat(r4, &(0x7f0000000100)='./file0\x00', 0x200) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 00:25:14 executing program 0: r0 = socket$inet6(0xa, 0x1008000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x9fe6d89c9ca54bd7) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x78e17be6, 0x4, &(0x7f00000013c0)=[{&(0x7f0000000200)="6e4f2f07dd45a0894699909d7d0a316661e1e75a32046458035e71e1", 0x1c}, {&(0x7f00000002c0)="bb9321ebe472db70a8f867f7fab326c890951560ebebf4e39fa7a4924bf3e3f1cd7cd07fbb2d59df6c36348e3c485af10d881a35e1488b8e0670a66535a5dd60b2b1a14bdeeb7f97fbd4ff480960e206137691d2d9d3c05da2e25d35d0643758ed9f004bf6cf30e74ccf1a3042c0852d6858209ad45b48c3b8a773c8b3611b22733a1a5914e9a4bef9079850f99fda91374488c03963bc0953184fba4aa5d88776dd706c5d2220345b7614ff0fdcb23ab9fc8a140898afeb9ec30ea2f4878a2f92d858ce2781ac00c3d5bd7d1c42d3cad68fe7e41236c14d8e53ea6cdd29ed83a705e5558dc4f80e0c9cbc60921b5815866da0b2b5799bfe88d2b0756546e85cb8c84a0f601401218f58b3db577468b5805c420b4b60daf53a385be736fa3ecac6eafde921a48b4e3081982b34f5c71c62af8c3739850a72700811b7d9447693a5b5289250bab88964718c793e214aadff196de71e614ff026627bbab474ecee45b8f7e7fb0e4feabd536640b3f098b72fd35c64f59d7afffff201dc925a8a430c2ceea1f0c120ede7f2d918b81a101f65695a909ea07ee9daa9e5bc547d6cd7a541df4e1b1096a5b9a0309e904af37704196e11c511dfe9ec987441c605236bd51355dc687bf6eb389a8bc480ff5dc36a522df43be9740a8966c5b12c918f890566e8e86411c4e30e7972fda261233e1b12ca5766e84012f8005f469cb6ffc100e4e06511df3c957fa16ba8fb5c9fb085a74be733d78b41b7a07f4ebb03d51f361db3307d47d38cdc82f1ead87bfda3463f814dc7237669bdb7bff348a245f7243ff42cc0801e9b10ed13421d3b265dedd7b98cea5319296b7e0e305629bb06412005525af9d1f8e98e59756dda3d7d835a19e3d2eff1ef9162e5b23496e26634ff5317924e7ce63633813d25ed4c98cb2762d0ea7b4f265d8e570ebe967bc2d106b4387c1e387abedaf1ef1c37847f4e3713b921dc6d398817d60003c8a3e016056464e0f5f92bb807c9b6024b328bc3f6ad2a38b03faf93ab623f269b22d0fe84ab41dedfa76d1121b6bf500723c6ce8d27214b211a18fc5e34bda37ae9991b8c7f277a861c9b880d006f234ff0b9bd8bf8e9fdc0cbda598e445f30868b3189de757268dfd84e16751e9c908fcdabae1e01c5663e9462dfc6eece14c6ffa5a92c940f11c03283067918510fa0b8cb64c4f2a9a65c7ea76dc16378880697df2538e619a1ec74a9821f5966a5bede3c62842c51b334ef0c3145759070aca4036780433b875e3d2170298e1aa8fcb34415c0368c9c9cc1ecef47ea5a819b80f14df4b9b28ba205b498e907963009447bdb3eeed399cb0f5fdc3994a5640925c938451e0ec771c62a8cee5789f09c80d2b3726959025af5f81ebae35b118c8e3eb8b2979deb589d26a16cc41b5a36ba8739581549e25cc98216f7dd0b3dbcdfc807addc4232e2c7d4b92cfdc50896f1edb3899e4438596f0934fd4ec67446bac6cd13686164f4ac0375e553c45e8d49f583b6d3b05cdde961b5dc264b2e1f18d312970666d62b21a3dc52c4902f37041bb77384faf852d22a8465c0b4080f62b9b0452a0389e2f2fe49d8695fd528b71d86712019f02d2d2c4a026d14697bdd145a16b4a99887c0cb8e222f4e0c6d4feb42e9cd0b5efec7fad9301dd6bcedf4d7840aedf70dbb38d1da028a0895a8f86ec80681a405a5cc7132a61a5dbfeb0f859ce19148cc6bc4f8ed36af0280a186a9245229f1feb961588d72a18c1fd203b4d2068afca87e412b2b9ff708485d245a651a8381193b7efbb4f97a82b1d5f88b8eee9191681bd6875d07e6fa43c13c2d001b66fd1e9f1c50eb8f2c008eab7708f217ee7e3a31852810feb45111a6d27ebc7a3da012a4a33faed724795f805d487a2ef7b190044afb826b9c775251e5e66139b95287f1431e011110670b18d120a7369aff8115ee5b3784d4e304f9c82044a82e27c354bd4b8d8d3799e5605a40fbfce489f9c97b43a2689efda337268c335cdb1be72ce9a0927df143150b12f917d7f9dfcb9181cd74f1822c7775b8599c76b493538c62a5923d7a120e2d871ea7af2023907a4f4e908b0dc01c9d287209c832447dbb77f53d63c61fae24a4ed29688db0503bdbd1811b8c4989d317187408932799696a307216f979a3c94e724e1ecc0f231eef16e5bc8faa8bf551d4ca7dc12a5d777ab3c1f2ad4b03688b74731f2a2e6fe5c9a83f43181d9d0e7e2b7b5c71f0d92f2aa3e3f459c5dda0e58a31541829f8b0ca45ab73f37faf1a0897a08f78da0e598660f26077d9333219ed943d7ceb344fc6fc4bfed618fefd0684a9457bd359f01e2359854b492abebf9533ac0a931c6f573230e05196272f56ddf6cead4066e32a3020c8b4cc1dbc0a392339c2b24609d0c5f3560e217b1926ca6c9cd2f1329ebb063334a68a3cd92e689ec67a3d75468bac7dfc9c503bc54a0d8fc7c91150bda79951fda0763bf9b28388be71cacb3d8705186cb1d28dfe0fe7d6f774ecaf1735b4029ff148367dab9c2362ffa1e2d13b4432fc1f8f219c381778cfc2d2b5f08f21bdff1a4e969b7bedb55bc58e96216f67e970f42ded8911b0c69c1028e7d03d561be0d038efa0c350320559196e1a5a5643dafca22302fa4aa4b5d6316477ab7f3e26f5a555a7a597863120e1f5e5e1e468d95bba9b70601a08fa3b9b8a509fb18c77ff65c47506f99c97c4b505de192f210dd65ceffc3d7c10714d1c37bfaf060a5559b0178477d10cee7f3d44b0dead9cbc40071d02a36b73dd8b4aa48a27d2d603be1a3a4d39ce01079b530620faf28a0818aa8305fa7311cdee3d9233911839b59581b1950546097451c3dacb014902effb44ae6286e5e064d959f7b4de198309b0c6dda0f727becfd73f7d31e5a9a584cc69bdefd64713d7f5532d4576ce82ad0f2dbda9bbdfc799f2534d043f20adcabf36ecbf0d85b5e7a0434a0d17adcab090a35292773b19544d6063c2a2bf71a729590b07b83859c52cf283d94bcd6d3d54a06c7174486971c4fa50548d903cced0819aa67b7014485c7e586f98a2d615255e2327e4d3393329aa8054f9def5a4949c7442a081550d879de42f82fc237bd3b4fcd4866ed1289b45cd02055b79fed408ca201c186085c88e96cb10d10d1496733937ef37a9efc8c0996a8773d1ad1cbc1740d1e3137cdbf44425445378d5514268439b2d201c600aade966c2f88a4cbcb10773fc14b6b4b7a604fc2112b6bb1801b89baa1fa2162062c77ad270912a2be0046a64c490c109de393719de4b0e0843ec58750e8d146b99b8f1f4ca1ffd4bf307b64ba790aa4310f49d901e4e41fb309e42964427b16b81d1132f1a7c821da262794e338d41fc789976a45e63f05fd7b6a3db9a59670fc3bf1e7eca8ccc763da589ed182c447aeae0754b90561c661c169330ccdad6f29fc8d68212ca4312e835d8ab70495b107abdaa14bec5dd843c3793d286ae27f6b83f86c6d7201ef6b7f61f2a23a75affbc788243816fa32aaf70b7a2498166be7377af79ab68cf31e49951f832e48a5211381b13ead013e0321e396e7ad831e1d35d5565614f32413ea6bfab9f6d3998ca5df07017513b634128d97feb94f4f86785b199dd52bdd91ba4240e87abedbaab8a9a51d52fab64781ad26c6c5fe4c72ad82bc221f6f5910d3d5f6942fccba69e2bd12aaa60a1afe0f94dc0bff854840f123ea07f1992ef5db78422fa1e80a9205feb9638ca4360bd9a8a371e0acdbe2d5d431c282acdae4eaefeb7b28fac94543a8da02bdab9891ff88550860b7f917e29002315508d09262a9c48176d1d2100b775a133a36e96a45f71f1ffbeaabfd31c7c1cbce71fe88cf570ec98b3a1abd0040df3032cc18a682b3f899ce8a1aa534a09be1151f03ed02be1cceaa6ffbf2d0c19858fd0c7f259c86d8a2b5b8e0ba70a1710b87f6d8723d29f8f7b02751611565a79e034042f15c41490d43ab2069bcfb86a6eec5a06835d403905b3228ac37856bfad73c6f7110bdccdfe4f6b872532fd6bfff1ecc3a54afee5e8475428ed6e2ba49773395ed5a86b7f86a307799004edc9b5f71d52b653f5627773affa890b3351563b3293a8f961a3c5113ee2719b315b2863f6246428ff4ec8df14abf7657622673733119aa6230c44c7fb464d462f58c02925ac91d6432ce1314e90861cb91e71574cbea869c0e06fc9d89ef214e6901db6c010f81daea47f40bb225949c0da80ac46f69f30d10a45ffc2656aee82d77fd0a3fe2ff11957b5e0628b8ac9959a152eb80d54645caea6c1999f87048e2c50d2e3b0283174ded4876c08c8521fd5d69504aabeb6a5263ea3f92e55971c3299fe2bbb2535ef38382e3a6f7f1d1339d911170a773b008abb6c72950273f102287ca5aa9162030eb189a27cc04145e83c12d21ee1deb979bd1a28288642d38df3cab4770494540becbf3cd1d68175051bf05a5f7a90d3e0f66c6c177f3ba511a314144d37cc08e84eb3cce96d0bed078ad3c76f3e37946baeada73e84232798195dc9404efa106608106e99711e71dab861d805a5df97032535b65da2c5bc39370346a9752c8cbafef072f9fedeab1f5a60167eab8355ccaf4dffe8809c65e9054e5a94a49de7849af294179ff88faeb2385ac3f7b4419f623472e1b48aedabeba238de38f0ac731bc4e29956fda5c1cfbe69870f9923749c7e463f25456fdbbcf57d91a02ea33dd9df4ec932628a1f5e5b8993e665be8c21d9d98eb989db258bca4fe7355807ea31bb2ba0a11cf880d3f06ffe73feed2f6a40944a86d751fe68aa99f5f1816e347c33303a7ee1bbb4c2f7f9ca3c192528459fc6d7a18eebe4f276f7debdbbc9d89419f63090d6fa52856a0c2558139a0738ba3af11c6b76edf976966dba3d1c7db303d594adb0c7bf0b52bb9ee9ba7996090f89fe9e5fe826d1d6b38f599b410f76d52f3f69d51613746997efa3d6d051cb3cd2e3953039d38251847ba7aad11eabc4f8f74ef7bfcd20385ff53bc8a92c4c9538e15dcf514fd7d7e5ec993ae123d1b1c5f9fd6ea95e033760e048f8d01c3df462d5ae3d8dc27790cf62a5be3ea3b557a19f89e51fef8703ec1cc17139e83c9c44b9b8b43a09f00159b884ffbc736c836463574f24f05343d8a44b9107aeabca5bb3a430494853b6a09730e7ddc2b6d7495c9ca6ac28936c5458ab96a7acd8756186d19a1355b2edb21fff2b515e577f0e46f4b4c8c5f609806e1abd45854407aef9a381d823cf2a149d885b224c90db36fa326253b3ffcb94784c73b6da98dc2b5cd6813dbb89bfc9bf323dc5665646e15f7f146504172c352e1f2c7c387be3edaf7a0ee7b92889b7cebcabbf1f05972640ef8237c3a64ac0c3b23c1680cc53037d1a758fd82ae979aeef4b2eb23cba2faa00cea90ab1b0dd8bcb313d0758870f67bebaa7e0624ae0d60dd4b3ce0cb0ee61b3595ce8238e0f7be5fb8aeef0b540223ceece253ee29891baa9f6d3dad1b3e4b24862ec424ac4516dc69f1fa8df6519ee44fb0f938b221095f80522728e64b1b14af21807bc3eb031545c7941fc166ea10b81691d11fef4874ed4818c263f94e95bb972b03b819984beb77237300dc8cfd0d9538f46f1b6c722a7764170a750159b02ac133f29889c768a8d8c2425bdd18460bc5d99c086f9baa8320ec916a93d9135ffb2828a05d958660b061d1d82ee6bf8577a0e0bf2e9e905115172137d8675616c2334af0fe256b2f8d93f8943ab6570303a3db77a00cfbac983a2e7b02de2349b2ae587626969e238", 0x1000, 0x3}, {&(0x7f00000012c0)="f47be0643f36270d41b4dc88c6783dd4ce1b4af93984addd267f0bdf948391ec2cdf39a70ab625b61a36b2e8ac8e19fbbcee5e9dd8d35964d5426913b310b303973ac428365e8b4fe970d06ed8628797a3fe46f46c6a0966154317d56312ee3f0d6aa9d71ee46e6ff711d1e29c9f54c1fb096c092ebf66c037101ed0e0f8492365a9740af40699403224f69c946517f3c12d9768ea3c48ced053419c234c805fe45562b3d65a6f79384164d681c1637eacf329b1f26c1ca16780a8704fe74351e6e8ec65a28a312ab6bd8b14631237b630ee61fa7c25af2f6f4a18006cb6fe5f98319738d1376b05a3", 0xe9, 0x2000000000000000}, {&(0x7f0000000240)="6ffccfb603edb7aa52a5aefebd326a9dbe5bf3a5ba9f2ed0", 0x18, 0x1}], 0x50400, &(0x7f0000001440)=ANY=[@ANYBLOB='e=winnt,\x00']) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') [ 497.086640] Unknown ioctl 35075 [ 497.154264] print_req_error: 733 callbacks suppressed [ 497.154275] print_req_error: I/O error, dev loop0, sector 2 [ 497.171455] EXT4-fs (loop0): unable to read superblock [ 497.224154] print_req_error: I/O error, dev loop0, sector 2 [ 497.230449] EXT4-fs (loop0): unable to read superblock 00:25:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8d", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, r1) r3 = open(&(0x7f0000000140)='./file0\x00', 0x80040, 0x8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000500)={'mangle\x00'}, &(0x7f0000000380)=0x54) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, 0x0) r4 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000180), &(0x7f0000000680)='L', 0x1, r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}}}, &(0x7f0000000440)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) capset(&(0x7f0000000340), &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0, 0x9}) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r5, r5, r4}, &(0x7f0000000280)=""/132, 0x84, 0x0) 00:25:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {0x400}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000480)) 00:25:14 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000440)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=0x20b, 0xffffffffffffffb5) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x1, @rand_addr}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000e0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80000000, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000640)) setpgid(r3, r3) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000006c0)=0xfffffffffffffe74) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000740), &(0x7f0000000480)=0xfffffffffffffe5f) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x0, 0x2000, 0x43, &(0x7f0000ffc000/0x2000)=nil) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") unshare(0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)={0xff0f}, &(0x7f0000000200)=0x10) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000700), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000000680), 0x2) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) 00:25:14 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)={0x0, 0x1, [@empty]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_misc(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="73dcf430"], 0xfffffd70) ioctl$int_in(r3, 0x5421, &(0x7f0000000040)=0x7) sendfile(r3, r2, &(0x7f0000000140), 0x7) [ 497.364082] minix_free_inode: bit 1 already cleared [ 497.395333] Unknown ioctl 1074835115 00:25:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 497.475326] Unknown ioctl 35075 00:25:14 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000440)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=0x20b, 0xffffffffffffffb5) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x1, @rand_addr}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000e0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80000000, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000640)) setpgid(r3, r3) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000006c0)=0xfffffffffffffe74) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000740), &(0x7f0000000480)=0xfffffffffffffe5f) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x0, 0x2000, 0x43, &(0x7f0000ffc000/0x2000)=nil) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") unshare(0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)={0xff0f}, &(0x7f0000000200)=0x10) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000700), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000000680), 0x2) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) 00:25:14 executing program 0: mkdir(&(0x7f0000ed6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='ramfs\x00', 0x0, &(0x7f00006dafff)) r0 = openat(0xffffffffffffff9c, &(0x7f0000012ff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f000045bff8)='./file0\x00', r0, &(0x7f00000cc000)='./file0\x00') ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000000)={0x1, {}, 0x5, 0x7fffffff}) linkat(r0, &(0x7f000001b000)='./file0\x00', r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 497.764759] Unknown ioctl 1074835115 [ 497.892165] Unknown ioctl 35075 00:25:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1a, &(0x7f0000000080), 0xffffffffffffff43) 00:25:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 498.025618] minix_free_inode: bit 1 already cleared 00:25:15 executing program 6: bpf$MAP_DELETE_ELEM(0xe, &(0x7f00005ebff0)={0xffffffffffffffff, &(0x7f0000de6000)}, 0x10) socketpair(0x1, 0x0, 0x7f, &(0x7f0000000000)) 00:25:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(r0, r0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000600400000000000000000000700200000000000060010000900300009003000090030000900300009003000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x4c0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000ac0)='d', 0x1, 0x81, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x21) recvmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000b00)=@nfc_llcp, 0x80, &(0x7f0000001dc0)}}], 0x1, 0x3, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000040)=0x92) 00:25:15 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, r1) r3 = open(&(0x7f0000000140)='./file0\x00', 0x80040, 0x8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000500)={'mangle\x00'}, &(0x7f0000000380)=0x54) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, 0x0) r4 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000180), &(0x7f0000000680)='L', 0x1, r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}}}, &(0x7f0000000440)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) capset(&(0x7f0000000340), &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0, 0x9}) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r5, r5, r4}, &(0x7f0000000280)=""/132, 0x84, 0x0) 00:25:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffb56, 0x4000) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0x0, 0xffffffffffff0000, 0x4}) r2 = socket$netlink(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) flock(r0, 0x5) writev(r3, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 00:25:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x10) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket(0x10, 0x2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) socketpair(0xa, 0x80002, 0xec, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000200)) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000001c0)={0x9, 0x401, 0x6}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000080)=0x81, 0x8) ioctl$void(r1, 0x0) sendfile(r2, r4, &(0x7f00000000c0), 0x4000000000000003) [ 498.365154] MINIX-fs: bad superblock or unable to read bitmaps 00:25:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 498.487242] minix_free_inode: bit 1 already cleared 00:25:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 498.540324] Unknown ioctl 1074025675 00:25:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x0, &(0x7f00000000c0), 0x0, 0x0) 00:25:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x105400, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) socketpair(0x11, 0x80001, 0x80, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000240)={0x2, 0x0, &(0x7f0000000100)=""/142, &(0x7f0000000280)=""/9, &(0x7f0000000e80)=""/4096, 0xf000}) read$FUSE(0xffffffffffffffff, &(0x7f00000070c0), 0x8c0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x800000000000001e, 0x811, r2, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6, 0x103082) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000000)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000a80)={'veth0\x00', 0x0}) r6 = pkey_alloc(0x0, 0x2) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x6c8000) pkey_mprotect(&(0x7f0000d1f000/0x2000)=nil, 0x2000, 0x2000000, r6) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000ac0)=r5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'bond_slave_1\x00'}) 00:25:15 executing program 6: socketpair$inet6(0xa, 0x6, 0xe455, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x3, @remote, 'veth1_to_bridge\x00'}}, 0x80) add_key(&(0x7f0000000580)='asymmetric\x00', &(0x7f00000005c0), &(0x7f0000000ac0)="1032300466000000000000bfd79af8b0063e520015ba1e620a1c21050000000000000000000000000074df01000000a1521ea84a", 0x34, 0xfffffffffffffffc) 00:25:15 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0x178b, 0x80, 0x4}) r1 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r1, 0x400000008912, &(0x7f00000001c0)="0a5cc80700315f85715070") r2 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x1, 0x6c000000, &(0x7f0000000280)='\b'}) socket$inet6_sctp(0xa, 0x7ba1a51e6af72350, 0x84) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x4c, 0x0, &(0x7f0000000140)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}}}], 0x0, 0x0, &(0x7f0000fedffe)}) [ 498.582536] minix_free_inode: bit 1 already cleared 00:25:15 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f00000002c0)="0f011cf0f61f66b9130a00000f320f0177ccb808008ed82ef3adf30f5201f466b9450a00000f32baf80c66b8394b378b66efbafc0cec", 0x36}], 0x1, 0x10, &(0x7f0000000380), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000100)=""/76, 0x4c) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB="03000000000000003900000000000000000000000000000003000000000000000b970255285149aa1097d169eb1f3c498ff1cc87254831e3b8bb86e48d0bc371a93fdad99abc8c7a764533ff37ffe906ec1a6737e316b81037ef22"]) [ 498.656399] Unknown ioctl 22025 [ 498.718410] binder: 21392:21395 ERROR: BC_REGISTER_LOOPER called without request [ 498.756754] Unknown ioctl 1074025675 [ 498.762379] Unknown ioctl 22025 00:25:15 executing program 6: getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180), &(0x7f0000000200)=0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x81, 0x20001, 0x2}, 0x2c) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f0000000280)}, 0x20) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x41) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000140)=0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f0000000280)="8b1d25566d83e3bc2eb038a6e638c813199352fc0561", &(0x7f0000000300)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000280), &(0x7f00000000c0)}, 0x20) [ 498.789282] binder: undelivered transaction 18, put_user failed [ 498.859174] binder: 21392:21395 ioctl c0306201 200000c0 returned -14 00:25:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x5) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000003c0)=""/210) r1 = gettid() write(r0, &(0x7f0000000200)="951b60edb1f36897f528f6bb0060e551a725a074563bb60cfb61c1814b3c3b814427e83d08b45163cc8c502984db6fee001a1072f9f491ca08da6facdd053c768ed03bd2bb6f86d5743416f0cc033e1b34a66a2f1f582c12989e32b6bd63d601b488b601ff118c786893d589f4e3193984de0fbd329c642af0866b51406dfb85cef6a5c1c6c70a2cd36b93df3c2f19f769edcb06b31f9c3f56272a95d689e04ef24e000000000000000000", 0xab) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10b000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000600)={0x6, 0x118, 0xfa00, {{0x80000000, 0x401, "6eb0abb95e4df5532e04aae84468f93ea1e442468fb64c33465fe4ce61e0d784a88bef0360e8261817277be58edbc42390a0e4b1ca83f6e93a20aa99ccd88bacb9925473b0d57160954ba939418df480c7dca96fffd043cc370e8b3d0bd7a4e828a6d240b887b134906460ca236acd27d7d362dc86148fba22162a70e7e75ebcd037c5ec6cd516e400ef49e6756c577ff2654313679d5e8d06d6b4459f688458ffafa4bda7206dbb6c7dbd7f10db68550ffa14cd4cad9a483fdd22015cd645557def243b7dc1ea4d6aea38ebcf701e7b998bb9384635afc070dafd81d06c293d604746eba61cad55c044954e85a28bb67aa7399aadf2438fa2651a3b9a51b212", 0x4e, 0x9629, 0xfffffffffffff000, 0x7, 0x64f, 0x6, 0xd40a, 0x1}, r3}}, 0x120) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000180)}}, &(0x7f0000044000)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={0x0, 0x5}, &(0x7f0000000300)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f00000004c0)={{0x6, 0x0, 0x8, 0x7c4, 'syz0\x00', 0x1000}, 0x0, 0x23c, 0xc0000000000, r1, 0x2, 0x7, 'syz0\x00', &(0x7f0000000100)=['/wlan0nodev}}\x00', '/dev/input/event#\x00'], 0x20, [], [0x7, 0x1, 0x4, 0x81]}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000340)={r5, 0x6, 0x20}, &(0x7f0000000380)=0xc) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) [ 498.902351] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 498.951286] binder: BINDER_SET_CONTEXT_MGR already set [ 498.957758] binder: 21392:21408 ioctl 40046207 0 returned -16 00:25:16 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x7) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) fchownat(r0, &(0x7f0000000080)='./file0\x00', r1, r2, 0x1c00) r3 = fcntl$dupfd(r0, 0x406, r0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$KDDELIO(r4, 0x4b35, 0xffffffffffffffff) io_setup(0x0, &(0x7f0000000280)=0x0) io_submit(r5, 0x3, &(0x7f0000000600)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x8, r3, &(0x7f00000002c0)="d8036f78bafa2f10d073a01ed44a1245d7c4d8f44c3e9efd2695e26896d8e6d4cf2a97e7b1b6a93149ddbe3e1a4d114949252482e64a91081746b73d13a4dd21c33185d277a5ddc45cd91b99e5c8ee54d433e60c39f20141c388e04d5ca8a737a1", 0x61, 0x0, 0x0, 0x2, r0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000380)="0bd1e137566d5f471a30e7e637f706e9ba3189ebfae427fb297151251692296ba39b8d354f56b5e36f2aa9c9c3c5eab9af5ecad4ca286296d8b8aab8b3cc979b62451d4f1b28eafc8c7db0ee2538e6a45b1bca01e6f5bac6e5622237ffab68872e99fd47f69ff17119dae4013a407cfdee4a388adf8004408a3c7e548e16fc0200e037f9e2f0c5c777dbe3548f5373220b8f91b46a545c42c062b4f1e0b9c7363aa4c7a831ea1d248cf87d63509b96e449c1c6a421d176832c28b107f8a1101f74dc6d92535a71139f633f1b6c850d4e5d23883bd5d6da163565cbd58ca4", 0xde, 0x1316, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x3, 0x3, r3, &(0x7f00000004c0)="5612ef4004a90829faf85ba29fc447035a8d8d9ab2a2445823690fc34fc9fcda5f75724b0c871671b5ff0bce74e4627518bd7b2da3e69851cc73c4b309b81347b7b15ec8ec926fd595ff7a13da201051686e8be71db54628fb8ce8ab6a3a73431e8d31b4af9a218678efb20f76a3f90cf01b67c0c37d0067973884eaf02ce01ed790dca311922600f1fa330cbbd3a532ebbdc143c0b7cac8ab0d44d772c3be482afaf3e9edf4068b9f7b35d1ad4d10b9ac692a2ec9e4dd0ba6fd4957d9bdf93e3c2851feaee695", 0xc7, 0x523d, 0x0, 0x3, r4}]) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x8, 0x18, "9f3263688e07cb2a78f5e1b1f8df411fc608e42cf77af89ff0ae7e1ff61a72431e7f25850ed90b72d444d7c646227ae79a9495c76eda9ebb4f8de4f25005c58a", "aed663b7dc455b7b008f3f896e8b394b713321db42335dbd1237af76be1f090c", [0x3, 0xfffffffffffffffe]}) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000700)={"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"}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000b00)={{0xffffffffffffffff, 0x2, 0x0, 0x0, 0x6}}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000b80)={@remote, @dev, 0x0}, &(0x7f0000000bc0)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000c00)={@empty, 0x1a, r6}) accept4$vsock_stream(r4, &(0x7f0000000c40)={0x28, 0x0, 0x97cf486f02f8cdb}, 0x10, 0x800) openat$md(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/md0\x00', 0x301400, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, &(0x7f0000000cc0)=0x8) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000d00)={0x1, 0x8, 0x1f, 0x16a, 0x0}, &(0x7f0000000d40)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000d80)={0x1, [0x0]}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000e00)={r8, 0x2287, 0xfffffffffffff801, 0x6, 0x4, 0x2, 0x9, 0xfff, {r9, @in6={{0xa, 0x4e23, 0x8, @local, 0x7}}, 0x3ff, 0x401, 0x4, 0x7, 0x1000}}, &(0x7f0000000ec0)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000f00)={r10, 0x10000}, &(0x7f0000000f40)=0x8) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000f80)=0x5, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f0000000fc0)=0x1, 0x4) getsockname$unix(r4, &(0x7f0000001000)=@abs, &(0x7f0000001080)=0x6e) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f00000010c0)=0x2, 0x4) fadvise64(r3, 0x0, 0x7, 0x7) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000001) 00:25:16 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x4, 0x4, 0x8}, 0x2c) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f00000000c0), &(0x7f00000001c0)='+'}, 0x20) 00:25:16 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000)=0xb8, 0x4) syz_emit_ethernet(0x190, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00740600fe8000000000000000000000000000aafe8000000000000000b7ada11104af36260fa949313695327c5f96000000000000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000b93c71a7e43210200f662fc0535d1acfe6eaa9de1ae151473b457f9b3018f90ecfe18fe15505cac71181e480c73805e023f3b2e0a547192cbbacab45e52a7223225bf8b1c08d2911b34869dd929c3cd6d8e15c371b52b46940ec6b70d800da67220234506f0a34fe21558a8be3367e1f8d2476a6613aa7d5b7c327d01a39555e8e35"], &(0x7f00000002c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20200, 0x0) [ 498.997022] binder: 21392:21395 ERROR: BC_REGISTER_LOOPER called without request [ 499.021766] binder: undelivered TRANSACTION_COMPLETE [ 499.021891] binder_alloc: 21392: binder_alloc_buf, no vma 00:25:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, 0x0) [ 499.109174] binder: 21392:21420 transaction failed 29189/-3, size 0-0 line 2970 [ 499.173305] binder: undelivered TRANSACTION_ERROR: 29189 00:25:16 executing program 5: socket$inet6(0xa, 0x1, 0x0) 00:25:16 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xb873, 0x6, &(0x7f0000000580)=[{&(0x7f0000000180)="a9f8fe4b0b0b7ddba46cf4a7c0f4a369d7360d2166036eb1a32301818fc232341047b236b4249d3aae4a3bd823ee8e630a3f614ac5bc43b9ee1f79e1ad6b239dc9d02c5ec66316f680b63e2d3b6deb8b9c30328e68eb7d437ef11a102c23766d32e799d95df60c4b43046423455e09f76e57edb1a2b953492d8046be9762bf93a7aac417a2586c9bdf737c43ee8470bebc790624adc0cb3fd426fea47af4f5553b5fd58e9268fdd877ca74d07e0f78f303ad3f20f5", 0xb5, 0x6}, {&(0x7f0000000240)="8e9f6343970f14f370d73885be831e4bd060b586a6ff6fe4063fd27ef07c29e9eb03e037c9e81bef9e001ac7d5b572b4c686031803cd", 0x36, 0x868b}, {&(0x7f0000000280)="2e3d550b6b536ab7971f843a6992bd8a765240235d80198261f31a4b023604ebb36d2bf49b813acbc55754013aedb387a8b4f3bf1a398111dfc041fd8135a45f52b6e9008bf4124a42d5ac3382e78fecf61e0ad1e7650d13a867e3a0da20c735b3cc20ec7a1e0fddc8fce563a2669ae2e81b577e30117c84763be0aa35ec890b91f64fa7acf2b28d7a43aa", 0x8b, 0x1}, {&(0x7f0000000400)="d05e7ff8d891540cd687d9e9b1461b64f601738a3da70b6d7edf161d13787e593993779bd38790c5c5b9d024e6f0f92974a79ba3b567e767b9d0e56a101a37f3b181d36d82f713bf156e96ff8355b82abe288cdd17903daeb1b156674b668113973033f75e60865937869450d6893dd95b2fc9ef3106f05986ec9b277a6fdaeed1c63f494eb56e30ec03cfb1f8097cd302220ff56970220cc903b8ba764a952feae2c081aa0991b371c9691834a8d25bef69f73d", 0xb4}, {&(0x7f0000000340)="90a24320a17fd9177c6f88dd68cd2a2c4c7dfdf767ed87c5bf7adf64591fb4e4bf4446146ff5a7708ac4b02c3144cb6b9607c5671c72aa", 0x37, 0x1}, {&(0x7f00000004c0)="389bd91b598027612f7f84b2b1eb54fd53368663758ba2b4231ff3fb48c904ef1b70ec7e599fef7356d1e28c10bb70367359fc23940e2e88ab7db000a9836c60eebbd20414284b143f877e9e09fba21989210d1a12ea57d9cf5671147b18460fb518810976720099a6ae2ee649571db5eb6f7df12a8d490bfb088d856e5634ef19c2345e0c1b4b5abbe9d322cd9d7026e5b6aaee8316b0fd7a51145e4e5e4125466871c153d044d9dc8888c90e654e7662de47", 0xb3, 0x26a}], 0x3200c, &(0x7f0000000380)={[{@swalloc='swalloc'}]}) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x8000e800, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb28906d6b66732e666174000204010a7900000000f801", 0x17}], 0x0, &(0x7f0000000080)={[{@fat=@debug='debug'}]}) syz_mount_image$msdos(&(0x7f0000000640)='msdos\x00', &(0x7f0000000680)='./file0\x00', 0x400, 0x7, &(0x7f0000001a80)=[{&(0x7f00000006c0)="3f7487526496df3b876db92eab22409361c54d39ffe7f54931c8dc219b0c0bfe7bf18899cca584bb4c0fd0666968c50f89a47379995a50fddf7a18187f0fa7c43597d2006a084b047898d32df0da6156ddad56ff10c69e21d4a24077bd5daa1f98383358bd9e892ff116a403fbe0122607e39cce6507f19d34dc0a8f2e2a91bc891c5c34a87944e55f0ba92ed569ec0c6d53e53df16ababc8e6490a722b824f1628b34ca869a05a30ca3458f7f2858f6e7f9b5d2935945fd1574ce628476d83584d8e0b69b15fe9d4ea3affb2582e04671013bb4fe7144a9886f", 0xda, 0xe6}, {&(0x7f00000007c0), 0x0, 0x80000001}, {&(0x7f0000000800)="cdc943190b0a23f3df18638a75a8c8c2c98728f79dcb289930afe0d451f44ebd20a5142dd185496f618a21168ee8b75b6fdc3ea18cb0b66d8f50f2ba5e3fde61b2bfe21cb715902f625202e5d92c8da7ff3a5da795d755f4abab0a3c9e719f5f533095ef97852c03c1ff4ce705436b662098", 0x72, 0x3}, {&(0x7f0000000880)="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", 0xfc, 0x7}, {&(0x7f0000000980)="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", 0x1000, 0x4}, {&(0x7f0000001980)="5c2e88e6f25035ea09249a", 0xb}, {&(0x7f00000019c0)="48adacfc7448ec7dd800d699dcdce9c641689c6c8a88cc8c08981891bb6b50a2ec8cd8f529743e96dcd1c589466b4d97f10b540711c22d4aec14197bf6d1049299392a78d16e9b0f30a1197d5ea86703e784b0f371d1ef30adfa54d2471a5c0163a08094a20c1da867a336a132a6b1aa45d5e9859bc597a6aea0214dd371e15da7e75b29119e6fcd0ffbfbd979ed33cb51979723fd17fdadb2c4cda7dfc6f3cccb1196a3", 0xa4, 0x7f}], 0x2400, &(0x7f0000001b40)={[{@dots='dots'}, {@fat=@flush='flush'}, {@fat=@showexec='showexec'}, {@nodots='nodots'}, {@nodots='nodots'}]}) r0 = syz_open_dev$ndb(&(0x7f00000007c0)='/dev/nbd#\x00', 0x0, 0x40000) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000001b80)=[0x1f, 0x8]) syncfs(r0) syz_open_dev$evdev(&(0x7f0000001bc0)='/dev/input/event#\x00', 0x2, 0x5a1ff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001c40)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x2}) 00:25:16 executing program 6: mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@timeout={'timeout'}}, {@rq={'rq', 0x3d, 0x7}}]}}) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, &(0x7f0000000040)) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) [ 499.392854] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 00:25:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$KVM_RUN(r2, 0x41a0ae8d, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000080)=0x5) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x0) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2}, 0xb) [ 499.564267] minix_free_inode: bit 1 already cleared 00:25:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:16 executing program 3: ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)={0x7, 0x1, 0x1}) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xe801, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="eb3c906d6b66732e666174000204010a0200020000f801", 0x17}], 0x0, &(0x7f0000000400)={[{@nodots='nodots'}, {@fat=@quiet='quiet'}, {@fat=@showexec='showexec'}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffaca}}, {@dots='dots'}, {@dots='dots'}]}) 00:25:16 executing program 7: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='user.)'], &(0x7f0000000040)='nodevkeyring\x00', 0xd, 0x1) write$evdev(r0, &(0x7f0000000100)=[{}], 0x18) 00:25:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="00805c19b15aa4b1"], 0x8) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 00:25:16 executing program 5: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='data=journal,barrierR']) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x80000001, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000600)="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", 0x1000, 0xa8c}, {&(0x7f0000000080)="f36793d44663b31c79925a48a145c13d7f88ce0a20b9483085d0", 0x1a, 0x1}, {&(0x7f0000000140)="794cbf438677394d49d6b883bdd9e1c988e489fa1452fcbda6b135735b734c2b3120aef6250b5014082f8df394a1d213a1d4b121ff5d21623048d61378f2224b49c2943d202feb0306e69b33", 0x4c, 0x7fff}], 0x1, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r0}}, {@nls={'nls', 0x3d, 'iso8859-9'}}, {@creator={'creator', 0x3d, "946654d1"}}, {@session={'session', 0x3d, 0x2}}]}) 00:25:16 executing program 6: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x802, 0x0) r1 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380), &(0x7f00000003c0)="fc", 0x1, 0xfffffffffffffffc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002500)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000002680)=0xc) keyctl$chown(0x4, r1, r3, r2) writev(r0, &(0x7f0000002480)=[{&(0x7f00000001c0)="6a91ea9d56a2ce06e550b9db7b5d62e814276117eb06aa6c3ffcc3e5ead10cab059ba56c376ee51278ef7d83356103f28e1828195a0ca60ae5110d9d1d09d12a868f3e8e95eb5c2c33613f802a89ba6a31db7453f57d5cb22f686b363f870809e2636f06399add6d973967bce1372f043e560bcbec8fad60566ceaff376381c1d46160ee71b11ccb96bc5d6bdb59b30250d977d7821b857526bef996ea8c624d3874ad7c03d6e49b5e5c557149a9c206e139dd6b05d7c39bbd8624bf9960e94fa05c729731323fa361f788714ed17240540d5e27306d37a2bf7dc69e77669c91540b22d43da56c4d5a13f72863673ffad19b7eea88ecc4bc2d011214a50364f3a63c12ed2bac31feca4639a9d985c61ffc9bc77fd0d201648ec26c4cb07b9ffaab57353c038e55874c23c2139f3ea2b478ac9fe0fef7a1df57b75a8d5230ba1808485499c03e3eb62bf5773d5e7066ebf96d79e86db0ccae736fa6be1b5aa2b37901bd03354b82277941ea4fb607bf0eea065722e6dfe1f79ab9945f6da2c45815f29e74a87f2cea362f4d463653b6362b154ecc5e4ab2f732b8bf92bc4a63e701712e026365520495b3e2703d4cc70922ef38d54c1e0f39faed91e9fb407b7eb28c7ec39578fbfc7b4fca53c7eaf7d7f73aa666207fa01c8bf6f08d05edc238c244ef9f5e2f0e41a98940ffdff635a3a93909f623cebd023893f2cbd05b5932a1cb9e25f02792d78ee866954ca2245bcd404f5313d1bdaada44b4097fbf348ed743b7c75f7dc89b2226d26c391226f38d786e6ea0e4e4448d4765c669294b30d8fc15181dc6b4710ef0e4f901eb028290ec028413116873eb2599d6f5d424d07de40acf8a3bb6b2fe2d4b221c7d42b7dada18a90adfb7c2233c26d420c3b3c5a990728f91ccf15ae6173ccac0719453703e0cf9804f8912fb44cd6a4f077d3dc669a3e4b8bb76e5587139e91c76b595c375c52480bf17826c00e922f74656a96d92f5716f2a8ca67261aa73212a44bad4bd586a5243d85168664e02b749abcb39582917173d4a36d9e961cbe6b8f01212391c71bbe3a53400a31f2b8c41436d1856b60dcd076a1c5e8d043c7493613a6c7f36a3fcb3c2505db2a700f636f2c5b73fd7808652751fa162b502daf200899c356ae73497208818e9c44ad2d5a37bfeaf4cac130d323e578570c92da9241ccb57e69e04e182e17221058afc66dea8bfa2d92d30451032b925ce735bbbf3206c4464dba28ca044746a79fb9dbb78ee0e10161b375f6704e6e64fc613c3772b724870718632ab491141a48efb7b899c9cc5d8cc37bf06b40773822bdbb6f376aa3f5110948569ea54ff305443bf292e968178fa6f02e691c356509f2ab75440afc4b5db515121266007c11815e5835aad733200e97e2d0f81b5ac85556d80d7e087248861ca357cef987c1d164aa0f284413c80d70ee73ae7e3135d77534a655d512c032cdc41640af077007def1114c7ea42cb1bf7b03e9f28066feaed0ee9ff5ea5f8ff266f001591f0baf09d2bc2ce8bd5c81742d9c91159e9a34008794cb508a6707bd10f6ad24a51402586dcc5e76a7cd6c597b911cad9b6522c21c1abe90ef6edffeeefea766d2e4e338f4aca64230bc3586a28c26b47d7b30ec4ae05667d7eb7001ca4f54b4bacb9f05ff34f2788618d373aa3ba3af53aa679fdfe19899e49ecde9f32f2d9a14977ffff87715ab40edc4b4a3768179f224cd286760409ae2a82d926c50acdea2b7163dd7dfed0215346a842ac083e9cd18189a939f399b96cb350739129534e20fc8cd2aa4640846bdc43d8b08dee28829893ccdf64674965bc3fef90543bd1060ba4cdfcb8f852c39c2db883b4c6b463982ac1aae6d11f55940ef44918a4ee2abdb896b947412975bd364a5d48ea765dd773e1b03efcebfd91acbc77d96c318475e4837692a36b157378e5ed6ef8d686c6d486c148441e0e798a88e716c371d9ac881ee679eac08f7d3f750d914d2b7009403319e600ce0b405a79f340ac2f91aa89b13fadb5b32992c4325afb7abb15da63147cbfa60d26656fba1c16db3f7f360c58a6bdbc63cc7931efd2eb17a714a532f320f4b5bf90b168ec8fabd3919bbf084a7585141fca62e2412babf01db03f34da09ef474092da79538cbd49e32bccfd1346d5b97185a4725727989dd67afbb3804954859294ff62adc2048c1e7cc657bcfa75e5e043d4be268054ab8b7130c3f80eac7dad2e14ed4edfe3bb87cc787eae1c575a04203f133c03cbce51737f2a386e9ace66b1d7876bc64ce16693732113d3347f386bd59f94f65fbd808ffcc82fe9d3e4cf6e4150b94af75f70d603b6e69b883387ea2a703ac6873fcae0c49a9608e6d790b98fa3af7523233de661a76cf5e772d69722833342049a96d3d2b303fef4b55c24a463d49d2d45ccfc3a603fda632922e4ecfd29cbe6f09192ac57ce038fccb350cc6821d9495946f647357dbe8418c182e81b90affaf3ab45a984b750db0293d7cb7e863676f79dd7a19e282a3077a8ceca151d0dc6b38389a5c9fc2dcf73025d6444a549013ae74d7afb3bf1a309946fe04a9915daa4ae6b4f4dcec1042410631dfb84314e3fd7fdd40e40f7dfced0f3d65699571d808d095622b7a2b510c7b771b2a4665719ee4d0052d57eaf1e3a43f5af37f8b47464fe273f01783b7ee5f4abc530e83130c48b33cac5e8e226a76b9bfad46d10acc20901c560cd6da8881bf91eba536b756988995b53dd4a0f4c4defd900f860998014594257aaf1d26f6743dffa0daf351e0bb8562996a260cbd09c8950439603cc92d1c122881f82379b6f75e5408f58c93e1acb3d47ee505b30904176b32674c950367a4e63bf532302dd610ed15b2a8456ce5bc465068f2b259cfed982b1320c773ab61ae7d13e9e0e3e853134e80633b996fd6fb9e932407c8f53179161a94e8c806d1b2fa7629945d7ccd945e96b3f6e739ac253d524ef72465f262f226bef1631af18303e2061ab6d2ae357a000ac590669688d5b27966c29c8da3d042d93ea01809b290341b339a5a2713c85d3f12a56e33a775e1cc2bab3d1468594bda1f54f2cd871658f54bb59ead9b82998783b87afe2b72771c8c72f35228521bce8e9b3d1c9edacb1c123d45a9f4ddac62df4356d168c2a293e4407d7d559cb2fc41bd4e840fd7a71cf0d2155d448a206dacf49b85cabbba66c610caa3c6c7f59398ed8b1d3241e7e09ead43fb799d6645b2af7a37036d595ea468510a4136bf1fe5709d15ab91b63b3cf88709b06c77e2f47d87a917e10f4238b0b675018247a98df116401ff869c830ce4b02d60eaa79f95c1fd2c9f4769e58261687bd43894b0e9f32bea9e5569fbbaf1cd959d26bf4291b459d949a8e7ef2bc08a38a90a248a5123039638005d85fab0cf12dc77eb7a0de53c723f3298b094843fb84ce1343e407824a43e9b6e80dfb5370394c46bba75048f23b83f36832b12f342f738b6a1cf5e3f5198c7ee28397ad49c799f100ae93b8850780ce6f4b6d30c5354c13ec5543437e6520b0f1ee90937c0078a8fbbf8e59ad0222321dd6b07f5c3e5f4650fdc95a985c95344c26580c7fda7e2e9e1d2ea2b8f1e336bcbf9c3d43717335778b46d4f4e620845fc2d25801e54498afdb6ad3368fc1ae6334f59d9b4310a94100108fb03b00048909200f0a7df70eeb8b3aa4fabf04fe1cc134d5a6454d5b4f7d6101061ebf26b6bc2e46f39d7ffbdea7f44b890f12d808e97b8ca4f47d033377d47cf40ab8747f52db0f2be21af3dde204f93bd806b41d9144dc8607385c678fb7b016b1aa2ccdd88605e85a1b721a3b2da3a777a628be1c63edc662500b481ec241cc061d8a0e1f055f54ae2f7e510a839c6ccadbf5d5a51025512a0a633fb0b6ad6b154bac0209a594549d928b2681b386fae446ecdc9d1bb4fbc54c52b840a24be0c35b178dd3655e1aded7d6da1978c7761ac3a1b0cf29ba24d1e64cbd294a4b3193ccff58fa053632211dd614cae2283db788c47890305fbdae9830ea5d29eed30e26ee9f354a52e215638e46459b965a6be576daa9d3d3c5d2639a97c91647e73ca6e59cca05204f33ab830dfef7980463781ddb2f1d38883a5c8fd14f4519f71ab54e150170854d017c5ff7a10f8d84d519faad20195010ae29b471def845192431dee4dbdc57b284a1b255c39f8a7a1b383874e3ef0dc33be36680a96ddc5d8cde35e45d293d47a8de443453645fe656848c7cca17b8e9f5407823633abcfffcd0a44580b2014318a8b2141e148dc16e4ec6b54a5da12912a0d66f3e040ddad49b2efac7f08bee480bf7fa1889a47764c6b34a3ef2998d9e6a31f3cffd7de0f289b625586c7371ced2f6eb40e1df42c2622c4ac62ada7b8e34fa2b580e508d6e687aa30933bc50364793f068a6c6e0f53034c54fb4a691315bc48c0f9033e2ef9021ad32a643ae43f101b7c66bcf49da7353a5290758a1b279230e54c3ec7e24f7c7e0ad772f2dccc30c6b3c227b99b8b928830aaf0bc86daabd601830bfb894e992f3dd3f23ce17ad154fac73e3042e224e9019a1829cffdff13fb6c4a5a93931fef4a32ae2ab3327c21e74f4e6eb7064e72f6fe9ce21c4ac11cc08c0686a9ecaf3ef57d943aaf4e92e5a286c668506a0fe458a5d38187b650041cbce2b4f7b8b1c9f3b4035fb4494bb019ce1bb85710d594b5eb5c6fe3e434416bc5a45aa94fed4c25f9e5747ad1cbb3c875c6a38bcf86f6b457dbd9d8c3202a7a1ee5cf48e6e6435f05a7f680e196b8beeeef934d44b4517bebe3f71ac88ffd4a2a4978a4c0cbe182aaddf85691825ddf4d7164eb69150f0d6ecdb259490ae2b0201ad6306c9cc4dba6f3989cf988dede08d01a406f96068110d34cdc60dad59851af579b0a7585ddd6d81113bfbf0f30bae8b2b9e1bc44cd7a104f631a244de55f46b2fab13cf08a549f0b64872ede0275ed90911470d1e11ebb31cf7c2f911538eec0190ce79e89ff536dfae14a3c2db86454d84997813f8a7e9e1d4a96afd427d859ac6d595ca11e21fccca3dbad3d156483677b3fff08e490361eeab15547f793f3853b6f1a6649c0d6fdc8287977b1c40ac3f217b9eea08784c9815302e77445c5719513df02d56b0d6464e4610bc2fbfbb434523ae8391738208d478999ffcb9dddff3460d184a9c878d9483086e571bfc50ff56fd0ac42b6def9b0bf5cb62b818d87cc6b95d4a6ea9f88b7bef0cd1446fc53314826894dac7bec9c3d5fc410a601c819c79abdd6d6b055a0e06005c0bfaa9f56c981273feb26cf07800933f817acbcfb8f6e32b5f48f7336a0b4a253e3592feb8e8000debb32f6b7132a403dd0df0e927ba8531098feff42e2533cf28a4cab94174879bbda48a5b84bbf39b3eda27179d55531c76019ee9f917713571a3cd0575af7ba47f0facbb6d719886ff817866a8a32b60e44689a0b99a596654bf9d4ad6519032cdc20bee4e8067e386ef672300c3782da36d35b67f589aedd9530807a6c84d557f3c3b468011eed76f2b365fe45efec99cc816c3e6158b5b723aeb294ea4c2df48dacad1bb3f62b401b0fb25c1a69b621bd87a9ad7934235ab650147d81c271ae7eadc0b232ddd59c5d2de296904ece7fce8d12a55a2c4f575debb51a95b27eb5f09e4053eb0ba97e65807680d9735e1f957da92ce6cd7b98e481c2cb09fd3ce40e3e9956e6c1cf788450f6f3c73574987bb4bbd5961bfb5b7d3f7615148c7ca0edf9d8d5db3403938d94c13171ee218bcf9907b5e805a8eb6dcf5fb5", 0x1000}, {&(0x7f00000011c0)="65812b7a3d3c84f1bec652cb79c1e2af96c5ab7728a9b84c0718010d88584ca8eee8dec0982b20d293567e57e17237646d7126be6bfa12a16bd210b88ef47097b621f781690b3b1d6208890289dd1b8ba6d223969f62a6168371de6df365072a8022b8b633c28558eca83d5e1ecdfa330c03f155d4279265bb35030d266b4bbbf13aea3fdbac95ed7ae9cc4c64f37f572e7e12e29221bef4d8d151917f1d7eca6606a05bd59c3e5af7ec355d1f16eb1a5c462dcae771d9d17d69437476e55186b615fe8f2e68899df8fc256b4d2d61dda4268496f55847b4d51675d7813e1a518321146750f8355a2ca15c45593dafd2625251429ab936e0f5c33e2deb8bb3992d0cb29ea088be1bfec0982acaee2478055a109eb1def12745a11f81b70842e28e52f8a22e3bd4f98ad8f810a00400a0b986e7de027a7f5dc41ea32aecf8bbb12047b9cc76b6ba4b55597582316349a25e163ae621fb834f757c44595ae4d4d6d296ccee4c767b2e867b8865d87d97bd39c48b52c2cc671bbd37a2110c83e6fe60e924b03abd2d119d2a2c763d33a3ce96280d46a6d13543ca0f194dc6d17855ae2142c74b9340ac6bca84b690c50c6b6432880d9a36f4f4111a9be7f10962190ee9f2dbe59a6805119878f5d1904f07a7739da73ca79dacf8af4d39e9cff0d38c23d3444928351d513344576d128ce8d151af260cab2484b28a8d125feef02e8752f1919585c5df5e5a43b5adc5fe12b9c38a5bcb875539b3e2415af6d4ec615d1398aaf5979fc09fc9f115757f3db77b0906b378c557cf5407186f25b4907d40a680c0b4deaf82f152b3645c5ee7dc3cf0e0c1815ebc6337c328d43877b4ae2389917822a6ec4115c748be1b3c936b9b7e0df49805c38346888811bd242685a61784237ee39efb723c8e838443e8546f87a78fab4c5f98e3ade2ba6aaeca59ef8ea97752e2ee974b5312a32ae25d1e28d1b8e229f1aac31d4a37771b97ef8d8e1ce8bbcf1f8fe09c4f78b9b5ec3d6f1c003fc7027800233a14a59f611d4c404292b27854d2941795c4fbb22d69261e529e056666071d0deea2c4c375ecddf2ef71ad85c24b051c70e7e7ad284b084d74b41dd8036f564249a1cfb99bff4bb427b752b8c455254e36d94d8f8858b29087e1aa8e023c4b75d714a0735490d0c0d98f7057acad1f8371b14d71acd587f3cf91e91a79eabea4452f7f9eef0ff714e9ee8f81493f7aba23cfedf3c25cf0b9093428425613cd31e3354900c65d1e21be94203c306cfe4d5b3f982815bec4e00c8df6879efd40621915667b7c3ff5099b29531d466697b4f2582f131eb450286f2974ca72d531631490ad6c87ffb82fb4f4c00459a51f313ea6af0ff5b35528511a6fab88363b4c173f60853d9ceb9e5841b1798530899d4d678ae3d204ebe26850d8594989155f27af12c184a5bed43f956651f9a6b488d77258558982584125787f47bbb63f17360ccfd9b68b641737678f02736b7568dbc297a04aea07f228c45f8f5f62011dfd8313365e782b3eb35b26f3b638599ca91b6c0e86e179a11188b67d03d131d20dffc3ad5f9d030e46c1237f9f3fca1dfe89e52d63ee21b0d7734a5a099e792e9c642ae4c7afbe4dcca1de1dd9f6d46dfad54bbf7f03159a2bc4489801873c535573aebddda53b05868c4daa654e7f31b4cc79c2d9631c31fa7cead47b02c9ce781a2c688bd36374b200a196705e17472b5c4ec8a81b6b54adc2e8580a1c2966b9c7b76d341b38fc40d63ded8e2731ad88a6c3e5c926f05b25ffd15cc5e4c96c4b3022f5919c5dda7012c72a3b372161b239523da3e1c3e7a6f8779042a46ad1d30fe974ec790fe65e0d344e664a97dc66afc584c6f4fa8117762e927a738fb07c8161f8bd972a4a84db3db361f47997e2f835409f85967eddb9c18cfbd345473f6ddee2fb63d46813be0d79c908eea2baf5acebf868ea77c3639a27eff68213bfce43802cafa348682a2b0faf2eedaf07eaf4b23c7940452f772fe15a256cab819b499f4f50c4ee2a9c1cf545210aae04a2e55b9364980b9770a6c79524f2c561346b69d2d078052089fe3414f6bded9d660defc57c8c6ca8da42f8aa3e90fb7c745d1426c73d29e9cefe18c5086a85a551efcc2bf9fb4589365edceacf894bc2ef213f24be308b85781d17c35d99bbc47b4341a9e2c5cc03e4dd3a006d9b36f160a6da3c5c1078db66fdd03561d6a978831edf2742a26000ceb8bc85a297af1cc7340220b29253c2c8efb4c20311dd17076433fca979939a5d34863d7653a047f4bab9e55e5ad613430abb33af5c1dba97c3686453a5f9e09206c930082024ae89cf63775d7f21de53650d92645e5dd6566f8d6a34a2cb0dc7b98b71b14cea331a21532a68b7f3a1556ae61ab3c115c6eeaacf80c8f2d676e0191fc777f418adc85044f89673dfccbaef46075f41f14e4761cf58f38150786be307d38d245a52c74ad49e83c9590e87f81cee7eab8bd0c833dc183b6168ee316700a0015cc0f8540fcd7267fe82d1d7e1c42a6a013e173cb2fba341ef2a086f4d991a8d2b12d5f0e3cf140c5678cda57b4e9917b4c69240284ff5a8b0be3ac4be07ec5fc78f702ff053fa5f3ee2373ebb47e3b6502055dfacfd28100db7539325b5988b705d0d3afcf6d05983e9a562876fbd5ed806da9a315e9ba94500ce8ad44c609e812f2ca40bb0e17339040614e16d14c7e587d4730d965772de97970de5e0812214dbde374e2c24957e27a64a7a1a7fea492fe3685bc0d8c1e794ad62e266b960fb0083a5d1a632543105958459e228b519ae0e59b448ade30e364266e2de3c897300bf91c78e7efb3cea7aa47a9336c03d2b44467a874ddec9f8d03d6953415b292d261967832ddc298c040a27ad22aaaf6062ddafa2320b7296f2779f76e81d2f637282a684cc1c4610b306a4618fd77ac978e2e0a84ba078ff520f9d258c2913313af0554f1733d2998d38dd830f57e46de160fc1c4cf6a5c819951aa6166d011210771fd1bc599c923070abe912324634d9517ba6d8962687ce829d88dc5994ca6781746ebaac212166cb5a09ae3647f9b24b8333f283d43ad2bfd1660fab76014e08762e48eac5a05f87c1a7e493ff2ce3436b4bd59e281984dad0b891d38b90249d22411f3297fad8b81e1616157db598460d35f9d84d11989b4d8aeb48dac737ddbc2ba52c05ed89a77474429be649572e1f32c220c749b1332feb4483aa70466599a4f005d26a4d3b2483060370f01bd1e9e84c1fb2a06c1e2aee2416c35c29b322a839a5ea3f51e1bea6d62a0f7eaad451fe784d6cbf7b970d77efb331cc91c3b77e2c15f986864b2b8ca437b4e3f96ecd6e8a799bc0cbf4397d856c17ddc1f02d6f834b79769ffb59451017ac194fc272c312ac83a4027d0ac5763e441b25bc218fb22f0ef32c49d036a0911f270a90d16a176b6a5be525d2476976c6b729a39f7e9330660b788d06b41d5fcccce1fb069f3f56a11934853c5a3354f10d66e0393ba55987cd7b0c4a8e1769da662a56fbbeea65336685ac057eb49745aa59a4f7efa833dc542679086251d0cfae3a4574139d84c39dfb6f88f6975776c580a55b44c740476e942c4eafd68db28ed9a2267265d79a80cd30a1dde30204f495ec771c3d7e244825c60052a43dc4d1b6ddfcd08b47db2da633c0fa2f492bcf107162d0fab437e763f52a44382cdf76120b4a055df50dcac4f09e6de7cd64dbfd61f2fa4bb405a0cbf3a25b2735cc7abb7193607bf6e26cee3e714263407a1f9cf6473edf58bc36aaa7de999df007bdfe05656c302b2e6103c96f5c5fb3c35a1860dfe89de905f894c2a9e29f4de3a81726bfeb7538f87fa093341c221f72dc4300ccc2f8dbe9d28adf6e4f8d7988ca5ee28612d2cbe05650199426e8ac3341e89fc5b66a0c869a31e0b6b4b5fb91f7f6ddd7e9727c6dae14f7e0170ec7d21eb7b073bcfd63252324bd176c8996835908ecf131e2f059cb4965e4e083621ed62bfbe345a5fdd17338eb46b8f361b89d3ba32271f48b8fbde37350ec9b7e04fcaf7208a1fc913565d51ba80295169282fd2fa324f0c1fee91a93e06fc7e29c26dcacb03a0a2f5f5b05e873a57058bd80ace64a3f19fe5571bef5e2c672eb92f62ddd1acc056636334eace4476d72bf24f3eef5c08c4c1837cdb81ecd4ccfbc9880b58491812ab2b5ac2e5513941497bdc9e5ce6a6139aad1edcd3f2e4eb62aa59845964337eeae987af9d84434ce38c29fb6c3de6e7b7fec4f94a5e58dd295ae877f713942e0bf0c9f204f34b807d43ed1b909dc22d5676bbf04271f2a7cb3bb9a955b6a1ad887e53c1bacfd77da94b319bd4fb3139f7c59a961184ac07aa4ea394228968b6abdd5d893f4fc4a5dc9482d27b9cdaad86356203e6afa50380b12413292caa4d0dfb637ebd5a2bc6a2c3f422386a626c02e30d45d113f590cdb132859746b65373092156943b7fd797075c8021e1612a5b02d8ca7c657a8744c536d240287bd3e467a38bf48860436bc48d329ada614e193dd660ea714919841cf9556beef74c4337c2df8fc56fa2c45cfa4cbbbe1878ff477a54b9c3ce0f8f0941ebcdf191e66d976c48f2967631b31e5172ca61139195b9cd6ec3c3b85aeeed5b8e7f5a3372bb22a932e2d42d5948f94b4ececa2647041c2d60e7dafe77b62ec9fb1a1a7c527cdfc2e68e7c76d0e24cbe25a81d0a2125828787038ce1ce9b7d7b4e680478efc71063918b0a5c4494403ccbf55fa626bc00eee6cbadca87e9fb1e7f2de24d931729536d7f220f6e23002ef191b0447127ff4ae1703e3698f89e3f0b6e084094be352edebc99bd6dd66e3ff198b575bbf0379f8fa4ac6191b509c71ab48c413e318e919d25fb9b8601187f68f95f7124dfb29ee89abe30409336bbadccbaa37494768f80e113d2a231b3fff397aaeb173ae4e100d67c3399652227c5406c511e6ebfa6019f10c959e799d7b69fbf81774d8976ca6569b52f5115fc332f8ab78704ca949bb34a9ae44d3e2c3ada782ef506280e3b2fc7a11922d0f4a387e6ecd1726eef12c2111c47e382bd16d1b03e070f8bac96e97367e97b4bc10789db9bf51aad32251b56c9d55ab568e77c4efc30ee9c19adffd3d775af8cc823ef997da2178602f3ea172e47cbc716bf1ce00f9419d329a5ef61d9ca99dca974b8435ddcff8bb0f5a157abdfe42a2a14069f32486a58db405368a167ac89f2627b016c11894db0decf69423e2637dc42b79f39d773a392784cdaff2c47353b9885a3ac8f2033314c32b684e3148758f4182f16a65791bc60a4e6b490537449873a4dfe6e106c3b853c5653daa0b1b249b6b186bc21477a126709981e1f1e6c17ef0b9365def1156b42d5ad20f3ee58871d80c8d0b4db3b8f0cfc542ef146938819d1b4623cc8f78df08f6a65762d2db051a05fdc28fcb3a8d69020ab41357e7b0873969bae6bd4af3d6fb52af7ccce8b68ad6d21aee81c05e8d3a1b8b2a643d831bfc1b75397cf0c821d3d206eeacb86fe05e071ce44e6faced88ee46685b220c989427c63dcb9b8126642bc0757f24181b264836f7712b4729316374d6f6882288f7f0968cdea564abfad35a7d945f7b22128182278348c7c99e12c3944b6fa24f5324100d71101aa4c49122c6626cd58da24c47e6b24a17a695f7d714382b6fc58c3d4eb867078fa52448afe9375e24caff9ee95bfebe0219df808e477dc66d5f7efc84ab2d4901e029fa9369e876577503063287dd9a02983263057bf8c1541b0f55d47446", 0x1000}, {&(0x7f00000021c0)="2dfae95e2e13a2b2304e8ef471dc9de0a3428cf879de26e1cb2cece9bcefe52b9afea183518ec0e3a99fae42525264a08e28f1640e40fee16202471fc4373df4083b7fee6ded11e4050b4c7df51c2eec423366001638e537ddad752e0bd57a91beb10727723ac93d1079042081073a32b8a4fbdf7d85f8c1d2db78f30919c2e1b3c7860fcb646e4d124b06d95727bea2a22254cb2700d35812fd33fae256c1e93aad1bce34ff3c3ea24895c142a8d00737406d2fec5eadf00b6b714503f50c5f926493397ab6789463", 0xc9}, {&(0x7f0000000100)="e2db6c6c3d19bb9f104f0f5f0e3a8c1833c5", 0x12}, {&(0x7f00000022c0)="b5963dc2e40b0ba84061fcf636bdd3b117b1d2ed6de62371d0913df50a659ba0c56ae663ac7b0a3a43468675cff03a501034770021a2c7864692172f95b8292f6345e1ed98139e7992f936ee00605e1655c41bdf936a130cb19ce0fc9d53a90791fb60382f4997b1d6edf00e94d37c280dba4a2b9357a66fae004c2e190d6dfc37e2e88ac8d2f13eff3ddb6f04f94563e393c9661a7f5aea50777a34ebddcbfa102e0a5378ab663c8398a4f66675c978501bce53b07308e88a4a2dc03f5647efdf7674294278e070b3b61a1a17485103af7129f4842a570cd5d2ca0ed38ddd29f66b6301e3af1177c91753", 0xeb}, {&(0x7f00000023c0)="b62f3d3691f5d9693002d9008c547f9ec181d01837ed161da5af8a8120bc0e3fb70d2fb454a800562f7badf794850c04a8cded55db42f4b4cf53f8ff73de85dcbcb0b3475a61bd78e4a67affd083d52d36f7caf6357d27e95800eb514631018b93772c4942c56f3415", 0x69}, {&(0x7f0000002440)="d910f5bb9a2daa5ff67fbe", 0xb}], 0x7) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4421c0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000040)=0xbb31) 00:25:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000c", 0xa, 0x400}], 0x0, 0x0) 00:25:16 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0xffffffffffffffff, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 499.685072] minix_free_inode: bit 1 already cleared [ 499.733590] REISERFS warning (device loop5): super-6505 reiserfs_getopt: head of option "barrier" is only correct [ 499.733590] 00:25:16 executing program 6: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x4, 0x8000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000180)="079c7e53b6f19579f66a626f7735556c", 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x101000, 0x0) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x200000000, 0x6, 0x0, 0x80, 0x2300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3a1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 00:25:16 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1f800000, &(0x7f00000001c0)="28cb48441b2b5405d19d03ad4690c378b251719327b36f616dbc07c04e7ce35c505320f2d063845ab4aea2e48e40b0676fd942045c8bfe91404cdf30f81e2078485a507a4fcd639016b64cbb089e2ad1aa102940165116798d2edf918bf3fd8aa282e6cffc674ea49d920c75f44038be8b8ba4b2eee3c2e3572dfc3556bb9abb653d8af615f60aed7076bc9a89a45365d767e0f42ca903bc1f5be3ec1ba830cb24864c03ae928f4a27fb3dc2", &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f00000000c0)="ac4d") r1 = dup(r0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) 00:25:16 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x767e) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000180)={0xe8, 0x9d}) accept4(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80, 0x80000) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000240)={[{0xfffffffffffffff9, 0x80, 0x6, 0x2, 0x80000001, 0x6, 0x7fffffff, 0xec09, 0x400, 0x3, 0x3f, 0x1, 0x4}, {0xff, 0x3, 0x4, 0x0, 0x1, 0x4, 0x3, 0x1ff, 0x8001, 0x81, 0x80000001, 0xd1, 0x1ff}, {0x7, 0xac9, 0x47ce, 0x400, 0x5, 0x6, 0x8, 0x3f, 0x1, 0xd58, 0x7fff, 0x8, 0x137}], 0x7ff}) [ 499.857129] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 00:25:17 executing program 5: pipe(&(0x7f0000000000)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x44000, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 00:25:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @empty, 0x1}}}, &(0x7f00000004c0)=0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000480)={r1, 0x200, 0x1}, 0xffffff65) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000580)={0x0, 0xada, 0x58c8, 0x7d7, 0x867, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @rand_addr}}, 0x8, 0x1, 0x4, 0x0, 0x7}}, &(0x7f0000000100)=0xfffffffffffffe3f) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r2, 0x5c}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='bbr\x00', 0x4) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x24000) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r5 = fcntl$dupfd(r3, 0x406, r4) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000340)) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x40000, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x10000000]}, 0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000300)=0xfff, 0x4) 00:25:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4", 0xf, 0x400}], 0x0, 0x0) 00:25:17 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000c", 0xa, 0x400}], 0x0, 0x0) 00:25:17 executing program 6: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3f, 0xa0000) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000001c0)=""/33) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x66, &(0x7f0000000140)=ANY=[@ANYBLOB="2b0000000000aaaaaaaaaa0008004500005800000000002f9078ac1414aa8e1414aa0421880b000000002cc2860400000800000086dd080088be00000000100000000100000000000000080000020000000000000000000068f30da75800000000"], &(0x7f0000000000)) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x80040) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f00000000c0)={0x80000000, 0x7, 0x7fffffff, 0x9}, 0x10) ioctl$VT_WAITACTIVE(r1, 0x5607) [ 500.400741] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 500.470863] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 500.588205] minix_free_inode: bit 1 already cleared 00:25:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e69788c", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:17 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') fremovexattr(r0, &(0x7f0000000040)=@known='security.ima\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000000c0)) fcntl$setstatus(r0, 0x4, 0x6100) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)=ANY=[]) fallocate(r2, 0x0, 0x0, 0x1000f4) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) fcntl$getflags(r4, 0x1) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) shmget(0x3, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 00:25:17 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getdents64(r1, &(0x7f0000000100)=""/111, 0x18) getdents(r1, &(0x7f0000000280)=""/246, 0xf6) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0xa0, 0xffffffff80000000}, {0x9, 0x1}, 0x1, 0x2, 0x4}) 00:25:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f", 0x11, 0x400}], 0x0, 0x0) 00:25:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f43a46d, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x40000000000000) r0 = socket$inet(0x2, 0x3, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=r1) 00:25:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:17 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000c", 0xa, 0x400}], 0x0, 0x0) [ 500.715005] minix_free_inode: bit 1 already cleared 00:25:18 executing program 6: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(0xffffffffffffffff, &(0x7f0000001400), 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x4, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0xffffffffffffff01, 0x7f}) [ 500.874595] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 00:25:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 00:25:18 executing program 0: r0 = memfd_create(&(0x7f0000001980)='+}\x00', 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000019c0)=""/245) creat(&(0x7f00000000c0)='./file1\x00', 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='fuseblk\x00', 0x5014, &(0x7f0000000240)=ANY=[]) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file1\x00', 0xc9d2, 0x9, &(0x7f0000001840)=[{&(0x7f0000000240)="05bebb4af13373ca72c30cc89890013fbf920c174ed80a3c05af38f237b8139fd4e9c40e6674ad16220268704dc3cc350a4065bb8d6ca203ba5ddfaa8d62fcbc4c406f461ea50dbc38c620e1eb53f95ef136d0ea59784e5f58def27b23652cc94709dd49894ab33bb5eeab9f2932709a161e31ef125297ae29954ff5f38118645ee4061d24fb0b0ac3b4ad2c1f0570f02944e64832b1422f4f55eaa952a352f6f4f974c5c42e79681bae831b8eb249764a94902ec7c21b2a4a902f9162dc8b152ccf9d90daa334ce515ccc22ddacfe483c27", 0xd2, 0x1000}, {&(0x7f0000000340)="d30956343d1132d7b6f1859baeb0f1b7b24fb64148f450c58cd1464d8366f9ce107562f77cd2aafadfaeaa70e3018f3e1745d8e2bb5e4ba2f0ee667d28e61a70ffa607baf5150d6f53850eadc5918646ac7e7a7ceaabbc3d588fbeca376eea52d64498012e4d043b3a6c4dcf03dffeb6a7c1c145dc4045db0fe02d222993ceed40b0ed5886e7b4cf6d6837e6768842d58fb0fabf86b7a6fe0bfca2999f8661362c264d5d08238ba5249cfd72ae6bd9f015dec7eba7085bf2930765818afc1475f12858256593dd6c0ab15db23d3dded1b2b0f4864ff36f52be3b4874745b84f4acc2918b636265d8c4c574fa14dc01f00467235fad29bd97caf0133c68e8e9db7a5e7929e70f30f50e7a57883b74874b4a538270e698b6e320b413080e9e4e09bca9b455e23c11d4048ab60c805f6f6d2655f92fc978770ea827fec9b7a9ad1d7796b6c22df7d615f2408f0f480634be09a6574cadc54b491b7336cc1bc7b3de71f50201a690b6cf8d40f6855a4210b6b0246ed023ebf6af962464d4dc0d5d17ad0e07de17e1ff00250113a0ec9b56dbb5d940ee984679c1e7bb4042227c387ac7c6690d5f5aa16b0c727050afc189c9a67ae919921263f060b2099f7668c8b89aa240c4a7f448ca39b1ad733dc2c23556dd7b528457caad57642aab11961cd04dd516215097fd4d9b4886fcaf29492f94d5f40126798196c7d7170ba93d7150e6f7e83cc30c0dc3b5eeec1e472b9c96089964e91a1154163d402b9ab88bca71f59df7d466da912aa8e5e38c70294dd2244a5bfdcb2cd1a103cb4cd236cbf09eff88328544f547159f82cb3398090579405443b40a691e413ea122f4ace5c008c75fdb955de09c023ba10fe47d0d7e662d28374af6f65642a0d48d79ec5411212b131beba2cee6d55d419448d66c4c745d85f0c23d6384efef8c7f3b87070b5681bc933603a5b6cc47f66806d3a9c2e5f8424353b81b97f9faca3ca7bf9a14600e3e7b1866974d9e5cae820d7f741f707a5ce81c05edd058aa66d3d6070cb002e544350239392737168e4aa134546bab8147959cd9f69508493ee1268211607656e132fd24b11fa633c54ac677822e862eade290441efea0cb1b70761b5ca18ebe61bfc97df77d5fc89af269d8965d7c22ea2446c7d52c5066f15957e7f41ef994b6d5bf603105966777c660ae37bbf40622e7e0ae028c1205b2bf331b81e47fd8b97e2ac43a5e2dbb96295e6833310b5b49cfc12d13c3bcb64eaa1d83cc173a0fe27d198707cb5acc57e00ed95bc237772542e46319dd8ffc5c0a4bf18389c30b13481eb9137976307e9cc742bcc514fcd80841fb4fefd23f7ec384cd878734dbfa43e9e46feb2539f05097e9d051c4847c0f9f045c46e4c2c1835e1adc8ccc7e813a00fe04edf55abe06bf715de766db2532cd48b2fb0ef357d06c1d6dcf3372eb55f4f67a61a17bb98f91e80bda06f040fac41088a180593d65c02e403bc9296f728a858de83751788eae39dd91f86b39b3442147a5d5c3f34604fff467aa52380b74ddc523c898edee09813124b2ce89b7fc38e1c8cc6d7f83709e2087a1ecee5eabecbbc64201f2d1065fb817ed193ca2983c18519c6de731e1ea33a526a8531d369cbe3e6ca299db1b47d09e3c856bdf494658a9ce26192a16d9c9f9c1c0a9aa87daab2e7c11c88fa254f7fcc9184ec85287d854b817537248ad03c48c73d76e662198512a734e6241924cedb55c124539e03bb28cf9c66a3cecfaf27cd7a067b16dea32a426560959ca6751e9526f44786383f3dc82d9fa8ec77cb468226f5c3673fe7f43055c5da415df52c875b63f0e108e735b6cb7604f2bfc6ce8456c58615c5e26fe2edb4ae4344db0b625118c777755e5939d254f95baeae0763ca13ced7d487fbb640e947b596aa0e8f2e8d4e46a72ce6c077a13701ae1a77a930186dcad5887fb92b745faf2cda7b64fce7fa3c9eb5c915d7269ed630046d54ed9061f90ba77193760500a7847afc711cc99e50cc80ea55efbf1c31065c933f25b2a3f7a4bee1046ed7ad84d94beffe4a889588967bd342fd1fbaa243977d48297798c8de606104f41b2db7bde0e20d543989b7ae55508781e6ce50da987fc97da2ccc41ab957fe3d9d54398ae3269a21a85cacb4a792f0130a2fbdc542a5dfd9a8dfe8bddf9245b1ea13c4a8c91b0412bb1578662d0bec1c8e02b2b9d132dc3b99f237dfbb3ad4cbc4e4a1f7cc0f065540b5cbea342e9bfb13965c1c11a2f3860118b7b654b3f51a4e5c0f3a150bc9c6e6f84a078577313347ab1e8289d13d447dccb5fcb144925960bfb7cf4e797ba8dc696644fd8e139f777733b2e96d125c2590530b223ae0aec20a2caf4f8b20f021d2767358f3b0c7e644fffdff102001c4076aa2f91a7924c0472f4341798bca957632143185c8fc95d19f9d536aaee435376144fa9bf2601d85b633b269011252fb5a5de8374f780229c0e2105b673f379345ab952f7a25339b3b5ace50c6877237224ea7abc980ef0ae0d9170f2124ca15f76f9c78bf790d3f6f2d91d43acc6ed15d7e0951178cd664e3f0f190488b092d2f0d88d440d230973771853704008f37f5e3087ad74b7f83b4511f99890cc057947f0476940c90b04cc13ab6c9e7cd8750e6f42cd194b32ac3da70a732bf8a5e2831fbb5ccf70d990913bf013c91355ed5ad227800086e537f7e8dd2c0313ee22f48b4d07bc83dcacc1ebe4bbe2b13ad15b1645c0d45982da8dab6b34534bef9b70e7f1f349a1f9bdb99fc8e3ead501abe9789b9821a5bd1e539bafab99438504bca93eaa13d5c44fe6a08b85796ee71d6171e107318fee3b5ca910756a1745bf6f1df8bbd4478b9ae3bee916830dd885fd695eb0f2931649197edfd76893b79ebd13fbc0a913e63e43cc91559b9ca52bc6342ef75cf33bf7306aaea0da26537afcddf1e4522aa9e22d4d2fef47204b0cb845e005627a09161cfe15eb4b6cd4342bf4af6b8749fa91ea777a9bb21597d0c4c020489ae2c5e758f771a8062b7b635207949decba887d39ce584c9fdc502b4554de7d24b09b042ea569b3cd6937d3e80e80743c4fd005b4b8d943800f70adc537740cb8f6e89e6ddb1b1c1cf43cb536a6569765b91a767cdd6708a3c2d09014c75a0428c452e2e657b39d2bc7a16076fdc1c12f2ca03a133b3369395fdaea54948a77a28a49ff7e7c71b147d37317cf8420ebf45132b930545c2077883facf5ff58043939968a7ad5c1e933c48383b48e11f0fcf7060a7e31179c80bff7d8e1d66f8b89062ce01379767f98ee12ba7a70f354f8344e9e3357fac0c60adcf8587f51e86574c6b8043204a3e2c155a6c60a3d83599c2dbec2010b7e626fdef91fa6b1487977f708225a6a8de854740eca8b4c17d96dd9b7c1763a1d6ff3405244e8190c6b5309c88c52d2e0fc31af4003d298eca02e23121d8116a9bcc0e9960370bbf42b358a1517ad50690f8689b79d0ca0b4d6c3fab4b21848b999f46a4b2579746fe29866571e8750930049a553b0d0242a750155e31ed76b7db081b4fb339e7dc24714649822f167377d2881cf76a19c46fb7f370aeb6338546381a4ce2e1445f445762cbf649c89b06c6724af93e6f2a2a533f7502a43b8abbf346f6dfb50273296ba1559a62ddcb0e006c4b381208183604d5612809ffff0ee7f0b742b5c7725e4e770aa4844cc65d80bc94b15503a2630f00fa977ed4987b0bb46531024ba2f176fe6473da2d87311190e9c0d1b665a5b60b53bd4b4b005298d7f3b42f882a80b1565092170171543c26e3d3035cc6b3615353616bc421a01483e6786e4d8fb66a9453f11336d611591f5148bb2dc423d26c6748d9249037ea7574d78be553a969bab53ab23c14fe51458bd52ba1661296b169f2576d3ef6f5174eaa78f4d49da10068389878b38e6e8559d09b312ba11181a1850fb34e847edd54606eaae553de31ea4e606805449a037db7584acabad5feda89dcba42d733cf73877eeeb1a66f816dda8dde0e4736095e66abd11565f36f42894da97150fbaf118480b98230da94dd48ff25046c36297dbf94b486c7717a0a1ffa56443ee17b8be4b6e557460c77a8a7e38d77c4b343efbe22115b7261d7a6478543f593309f2f0737ca6f0618740c9b44b3448f43c47faab364d7bdd59b499601c30dd1f1fbac6bc821e32e0fdcd3a691a6024dc57ef0471c3683197946807411db1d0d0f48a15bb3cfb56ba352ee9cff71f3157f3b621d9c4d62fa870536dc9e641304226679ca56cc682b43333a2f2f857d0211f9178bd407bee77fe2323059f3047f9cf7e580ec5a83def9c2e31c6a165446fd0a57353a79f84183798d0bd2ec01948b3eb5d54eaf38f4414b60b2fed5ea5761890a8089b18601cbbdc34b4145a9165275bc984e87f596bc4cf1719fc11143d918967bae45293a345b43838c747b3c86830c5f03e3f8de2a4d7043d8955d0ab12c74ca53d10fba75718a5cd37e496b1baa13a4c0954ab723c77219254051f60f8bc7310f4ff073eb79ac168b33b22c800b07356235b32624e03fcdd2c8208e9e96bd016f7a94e22efa64427b2a111df23aaff292cf380a17ddba6aa1990c3eade909730229756b77070029d7ffc49bfd72ef81a5c6de1440e7975dde0fb85f2b16398d172d7fd97ea69495f341359195f86185d953ce298bc3e3556720045d8efe4090bea08e564b610bbc40fa5e3ecc61d1d31a9e2361fc48b44f47e7da52ea1713e176a4b1dfa5ab4dc8203ddcef6eb03383756e4f271223f65bb404c4179bbc5657d97a2917285dc1f124ee5580112d7905268398f77c1e99b3fb81c90530043a64a9ceaedeccf4c74d0e2b6c80da34a3f3a915877f3be35c082ad1c57f747a10cf75e60b4e266650cfb296a14da5110057fa9180db18b8c29b4b8faff8460dbaabe9e8fd34a02ef03a24170701fa1a8b73e6c6b09159d7a257cff2fed461e1e8c213ee41a9d1ce253fae972c4ccdcce0414d713f8def839254dd1c8f18606d2da2e68d74b3af9a7da920dbe1aa5ac771f1af0a4b7fa6424d364c059efb10864f8dcc5c7d37700c47f520742d13a63059f460740c21b929fe0b2e340fdd7a2e8f7e207d88ba67232552a35aec0cb963d16aadeedff502efda6d4dad4feed8763c178b3445cf194454405ec874610f714d32b25d5922da0b7a2c178925429a6862b37f2ec52c70f91a6c9ffd265443e5e97903e2b2e01a3db7c622e872de19d4b53da52f17433d0f2ead4dd3f827f521025f477b7cb78b17d7f080d3da8a663b9cbead13dbb5266c4c5f1fb6cc367b526cbe8fe2c727721072d8cf7121b82e7ee4df44f6713612e42475c6196e0a8e7586b9675ea5756153d74a8ff08d2bc8950dff814df51b079b9a1d889f391f1377928fd8a9a39993ef684061415a703117c8e17c33ec6a7a1a94c8505d139125b088d25cf45685152a66e99e2cb2db0cbfb36c2dd5df7338b953d5faf2dffd4059a025350e81d9a20e70f3526bba0712e2e0f8881dc84e9ba775cdbe833ed5e74a0c057b496dc182fc99cb605326036f50120bd330b39483e5c7bb2665b7e1a47c4b7d41a280c175354862447a40006b57c7502dc5b2688b57f5d8040fc7d19e5d583a9bf4562967236ae2a211fb83d44b88ebd96082a5154d190cdee663fbb7df40b332461b57d3c01037d0d8cbfc3aa5b7067d3ec1842c496d70f43c01fbecd2628de4dc65bd196eec5f578b88d2749f450c9f629ccbdbb21399d1214e224cd8fcf89112291dd3da36e5ad38878", 0x1000, 0xffffffffffffffff}, {&(0x7f0000001340)="e43c894198c677853549abc8bbfa82cd546421c6264bb4f3175731e829cc0aeae38433a6a1580ba797097ecf0f0ed5d53cef6cb0e30e28a0b406a6dfc96a2a9b231741fa7a1df440604de94e49ff2c38d7e90e8ddb1d34d7e4f6c26d7c", 0x5d, 0x4}, {&(0x7f00000013c0)="af1ba4f9d76cc33c954727fef627cce81e0f5ff2643320033ea7bfada5cf7f49a87ebcd3086f9643cc2754efdbac54855c5437543fea057ca64e36ee1b37f7dcb63b9bb2682faf5118e3b4922835ca09f793085f428fe641a92bfe207729c50fe3cb024f72d1fe2141ecae9301edbc1d41f9059670a1bd0a21017bd0c2f92bc481c3a334fb38e0386fe8c781c2a17e3a3b2a46dbbbba46dd9879a1c7cc75f7a202946ac696ef2d1797ca37f3ffd50643b6ce8fd993081d37f9bd0a61962e82a6692387e1959bffb09d7f9fb66141f8c2a84ea161de6321595ec723ee27", 0xdd, 0x8}, {&(0x7f00000014c0)="02b992eb80cfdd53056435620dc6018e339b4471ca77650d3ef3e079935a12e1ef6eea40fe50934ccb87d95f834c48fe6f268737be72572484f629b261267ebf8df23938bb0591f7a7cb3fef6759dea47774799ec55355a83174c566cce2373c6b429d5fa53dfd03ccca3466", 0x6c, 0x7ff}, {&(0x7f0000001540)="b171d517c0cc71742785a9fa64dd5dd7abf87d46262c8e7c19950812a75078877b9744c80a", 0xffffffffffffff07, 0x5}, {&(0x7f0000001580)="3902138987928dcac0c132596b6273abe5c2ed387c98c72c7fd0ab14f650cb0818ac1b76383ae9cc9d027c49b1f9a580a2f7865a9a8988ff9d230c41999d1bc51150f851d54460d80ad0bd68c4716c5e9c406fbce5f3016676c9821efd1afb4561b5430330b029e8d8467f05c35818695cf57aaa5eccb9976ab1eaa1bea4a58d781469e4f0398571e8da9357013fb9a5c7d506c61c29281c9d37af0b0d0524a454a507300606ce802cfac0e696634434a65f41f9e0188470bc92cbe281eae177d2", 0xc1, 0x1}, {&(0x7f0000001680)="e1085dd3f3a8ff6c14503860cd22c41c8bd9a71216dc1d66183ad5dbbaf898d40de7985a9236e49c5e97fe601552b72aebf6abd8249751db1b16e6bc54a2ec34a4b60e0f0090b31679ed18062ee1c3b8dcf82935219d0e5d4ef29c89947b7bbfa806761dede3d3675b3c02b7e166e7ec142c415995c4a8cf15c8857bdc7537939f11", 0x82, 0x100}, {&(0x7f0000001740)="b55cf645dca8cccae92c46350f9397784ff554dcc8e7386b0159384542211c708ae0c929caafa5bb77a7c6ed822ff2e4a7c2f697f08a6986f1e4747235660b1c861ceaf690d37e0816fe6b6341875c700677b9a8c8d2ff78a8ceb554c5053209288a65cef26e5380768fa4edb13760f22c79aff6d87620c72eef47eb6faa6e2a498bda521b9175c182f02d0689eedbff9137b0606f8fa365392b5e5eda8c8da071944d111d1dca379af98011f5728f97d0b966a6495ff62be61232023cc94f94b5ab0fa94b1da8691ddaf238cd1e59164dbe442be49083115feaae8edfdc70ed174efb6a933b8b197a9da297dd3745b913ad", 0xf2, 0x200}], 0x200000, &(0x7f0000001940)={[{@space_cache='space_cache'}, {@nospace_cache='nospace_cache'}]}) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000180)='gfs2\x00', 0x0, 0x0) [ 501.097297] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 501.243408] print_req_error: I/O error, dev loop0, sector 128 [ 501.249554] gfs2: error 10 reading superblock 00:25:18 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000c", 0xa, 0x400}], 0x0, 0x0) 00:25:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:18 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 501.659526] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 501.715150] minix_free_inode: bit 1 already cleared 00:25:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) connect$netlink(r1, &(0x7f00000000c0)=@unspec, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)='irlan0\x00') getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x1c, &(0x7f0000000000), 0x20a154cc) 00:25:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e756d615f6d61707300b5c62e9e8de9f243640adf803c64577aa9e4e33f9f72e5185191246f8fe224c3925050e2a9e57dbf6b530a5ebbec861baf4dc4f84bb1df13f0b152aa3b6e780781b6a8d091f88658ef4f16a21417d83d000000000000000000000000000000") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000140)={{0x2, 0x4e22, @broadcast}, {0x307, @local}, 0x58, {0x2, 0x4e21, @rand_addr}, 'veth1_to_bridge\x00'}) pread64(r0, &(0x7f0000000080), 0x0, 0x0) [ 501.974511] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 502.021214] print_req_error: I/O error, dev loop0, sector 128 [ 502.027223] gfs2: error 10 reading superblock 00:25:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13}], 0x0, 0x0) 00:25:19 executing program 5: r0 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300)) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x14103e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000340), &(0x7f00000002c0)=0xf) write$binfmt_aout(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2d8fa246a1f22794fbb1ceeb7a53617aad88a58766ded2ad1ca13b12baac4f65470bc2423012c089d30f4086cff39c81384bd5d6374c52db8f70f61af7453961f836a472862f832f922a2e34bc9dd6f80cdf9b15060bd1de9e8e4cd5fb1f756a152b6deec52204c02cf0df5cd86471356df771e0624f492d59e6f635b9d90659f6ad461611b1ffc8edd"], 0xe5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r4 = dup(r2) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000580)) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) accept$nfc_llcp(r0, 0x0, &(0x7f0000000240)) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000005c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000380)={0x3, 'team0\x00'}, 0x18) [ 502.100214] minix_free_inode: bit 1 already cleared 00:25:19 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x20100) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000280)="ec8931887fb2a250fda26d37fdcaca073e2e7ce7a0163133e2f43e3d8e39a07b63d2497d52db1ffe8f96303acc1656434286496d92d1068498938ad40c34dac81a82178c8fa47d665967c75c382bb94cc904869eace8f0f6799e2d1aadce80c82e4aca1e996bac0cd50fe3db92f71d60c6e81e98eda8c711c808cd564ab0954d90397f90d39ee3302826060315705e264f4644b4f3ef41c797d08d4789d4c9c21a4ae2d156278ceb54316c494429977b068d32ce4555f72b1ef3846419599cc2b0e6", 0xc2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x18, 0x2, [@IFLA_GRE_REMOTE={0x4, 0x7, @loopback}]}}}]}, 0x4c}}, 0x0) [ 502.402829] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 00:25:19 executing program 7: r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0xfe, "9da62a5a833322549ab8cd7d6157d96805d8ed8ef95588a8028e11efef7d5530f095a91c472414bc3eb5ff82165e0cb35f16dc14a4e2aa73f0c2ccfae71bb306fbdc349d3ff7ae9b104580748c339c4abda18dd6e29559957d3a16d2be0aadc88b1e082239a1dbaa6bba6f8dc86bff6118ef2d223f963d7b77a30535bd2057b230eb6410b7b0e76fc3957dcf6341be2f400fef11318467d267c4e11c62283c3f4634b61b87c9fa9a4a82f5866c37ecd0692e1c0f0b09d4e5fa932f15b287d4c26407a067f0ee01414dc9e9933dc26b679e72eb2b124765f1952eceda8cd06e185efbbd49b4552ea75451b6c446000fe36aa5142a33c686d269b0916a375c"}, &(0x7f0000000180)=0x106) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x1000, 0x8000, 0x10001, 0x2, r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x34cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000480)) close(r2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000280)="ff23c9e5eb4585d839f3f19d65140d25d08cba766c144168b6f5650a4e5f6cd3daa68411877a7fd3def740986aad25fbed4d64c786b657a93f3672820318d91813d22673248eedb9477bfea15b36c0483c3a748f4b9d0022acababf6c845b15096a1c515c18b08099d43f81058019a3e603f9ad77ab9c6f184213e5afa3232f376124cec50a29aaec6de79b005f48bfeca6282a5e656f226b111d5", &(0x7f0000000340)=""/227}, 0x18) 00:25:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) finit_module(r0, &(0x7f0000000100)='/dev/adsp#\x00', 0x1) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x9, 0x200) ioctl$UI_DEV_DESTROY(r1, 0x5502) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x6, @mcast2}, 0x1c) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") getsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 00:25:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x805, 0x0) connect$inet6(r1, &(0x7f00006f7000)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffffffffffb}}, 0x1c) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) bind$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f000051c000)=[{&(0x7f0000000340)="480000001400190d09004beafd0d8c560a84580080ffe00600000000000000a2bc5603ca00000f7f21efa2963c31dc89000000200000000101fd0000000309ff5bffff00c7e5ed5e", 0x48}], 0x0) 00:25:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="000000000000000063000000000000000000000008001400000000000800150000000000080006000000000008000100", @ANYRES32=0x0], 0x3c}}, 0x0) 00:25:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000540)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0)}}, 0x18) 00:25:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix/', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 502.578372] minix_free_inode: bit 1 already cleared 00:25:19 executing program 2 (fault-call:14 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x9, 0x60080) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000a5e000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000140)="67640fc75b08b815000f00d00f381c26c900f2861ea375ea00401a01ddc80f22500f01d10f01d10f017300"}], 0x40, 0x0, &(0x7f00000000c0), 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB]) ioctl$KVM_SET_MSRS(r4, 0x8040ae9f, &(0x7f0000000100)) 00:25:19 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) fcntl$getflags(r0, 0x408) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_address={0x5, 0x9, 0xffffff88, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 00:25:19 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400000, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x9d5, 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000000)) open(&(0x7f0000000140)='./file0\x00', 0x400, 0x160) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af25, &(0x7f00000001c0)={0x0, r0}) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) [ 502.780985] FAULT_INJECTION: forcing a failure. [ 502.780985] name failslab, interval 1, probability 0, space 0, times 0 [ 502.792761] CPU: 0 PID: 21667 Comm: syz-executor2 Not tainted 4.18.0-next-20180824+ #47 [ 502.800931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.810337] Call Trace: [ 502.812952] dump_stack+0x1c9/0x2b4 [ 502.816600] ? dump_stack_print_info.cold.2+0x52/0x52 [ 502.821826] should_fail.cold.4+0xa/0x11 [ 502.825908] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 502.831071] ? lock_downgrade+0x8f0/0x8f0 [ 502.835264] ? proc_fail_nth_write+0x9e/0x210 [ 502.839775] ? proc_cwd_link+0x1d0/0x1d0 [ 502.843863] ? find_held_lock+0x36/0x1c0 [ 502.847972] ? check_same_owner+0x340/0x340 [ 502.852333] ? rcu_note_context_switch+0x680/0x680 [ 502.857287] __should_failslab+0x124/0x180 [ 502.861553] should_failslab+0x9/0x14 [ 502.865360] __kmalloc+0x2b2/0x720 [ 502.868909] ? strncpy_from_user+0x510/0x510 [ 502.873335] ? fput+0x130/0x1a0 [ 502.876628] ? do_syscall_64+0x9a/0x820 [ 502.880607] ? __x64_sys_memfd_create+0x142/0x4f0 [ 502.885455] ? do_syscall_64+0x9a/0x820 [ 502.889461] __x64_sys_memfd_create+0x142/0x4f0 [ 502.894141] ? memfd_fcntl+0x1e80/0x1e80 [ 502.898243] do_syscall_64+0x1b9/0x820 [ 502.902154] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 502.907526] ? syscall_return_slowpath+0x5e0/0x5e0 [ 502.912478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 502.917333] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 502.922368] ? prepare_exit_to_usermode+0x291/0x3b0 [ 502.927413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 502.932269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.937479] RIP: 0033:0x457089 [ 502.940685] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.959588] RSP: 002b:00007f488107fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 502.967303] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457089 [ 502.974592] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c231a 00:25:19 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:20 executing program 7: syz_mount_image$msdos(&(0x7f0000001a00)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x141042, 0x0) fdatasync(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x0, 0x0, 0x8}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x2, 0x0, 0x8}, &(0x7f0000000380)=0x14) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000200)) connect$vsock_stream(r0, &(0x7f0000000440)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) fsync(0xffffffffffffffff) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x3d5) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000002740)=ANY=[]) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) 00:25:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet(0x10, 0x3, 0xc) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000140)={0x0, 0xe9c1, 0x7, &(0x7f0000000100)=0x4}) finit_module(r0, &(0x7f0000000080)='):security\x00', 0x2) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000030807031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 502.981863] RBP: 00000000009300a0 R08: 00000000200000d8 R09: 00000000fbad8001 [ 502.989139] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 000000000000000a [ 502.996419] R13: 00000000004d6738 R14: 00000000004c9d0f R15: 0000000000000000 [ 503.011975] minix_free_inode: bit 1 already cleared 00:25:20 executing program 0: perf_event_open(&(0x7f0000940000)={0x1, 0x78, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a73000)}, 0x2801}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x210802, 0x0) getcwd(&(0x7f0000000180)=""/209, 0xd1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12) 00:25:20 executing program 2 (fault-call:14 fault-nth:1): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 503.133210] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 503.242733] FAULT_INJECTION: forcing a failure. [ 503.242733] name failslab, interval 1, probability 0, space 0, times 0 [ 503.254743] CPU: 0 PID: 21707 Comm: syz-executor2 Not tainted 4.18.0-next-20180824+ #47 [ 503.262904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.272267] Call Trace: [ 503.274872] dump_stack+0x1c9/0x2b4 [ 503.278517] ? dump_stack_print_info.cold.2+0x52/0x52 [ 503.283727] should_fail.cold.4+0xa/0x11 [ 503.287806] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 503.292923] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 503.297864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 503.302631] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 503.308116] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 503.312889] ? retint_kernel+0x10/0x10 [ 503.316811] ? check_same_owner+0x340/0x340 [ 503.321145] ? rcu_note_context_switch+0x680/0x680 [ 503.326107] ? find_held_lock+0x36/0x1c0 [ 503.330181] __should_failslab+0x124/0x180 [ 503.334429] should_failslab+0x9/0x14 [ 503.338237] kmem_cache_alloc+0x29c/0x710 [ 503.342390] ? lock_downgrade+0x8f0/0x8f0 [ 503.346546] ? shmem_destroy_callback+0xc0/0xc0 [ 503.351221] shmem_alloc_inode+0x1b/0x40 [ 503.355288] alloc_inode+0x63/0x190 [ 503.358923] new_inode_pseudo+0x71/0x1a0 [ 503.362988] ? prune_icache_sb+0x1c0/0x1c0 [ 503.367231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 503.371995] new_inode+0x1c/0x40 [ 503.375374] shmem_get_inode+0xf1/0x910 [ 503.379356] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 503.384846] ? shmem_encode_fh+0x340/0x340 [ 503.389105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 503.393879] ? retint_kernel+0x10/0x10 [ 503.397784] __shmem_file_setup.part.48+0x83/0x2a0 [ 503.402758] ? shmem_file_setup+0x19/0x90 [ 503.406939] shmem_file_setup+0x65/0x90 [ 503.411128] __x64_sys_memfd_create+0x2af/0x4f0 [ 503.415813] ? memfd_fcntl+0x1e80/0x1e80 [ 503.419894] do_syscall_64+0x1b9/0x820 [ 503.423815] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 503.429200] ? syscall_return_slowpath+0x5e0/0x5e0 [ 503.434136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.438989] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 503.444019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.449561] ? prepare_exit_to_usermode+0x291/0x3b0 [ 503.454585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.459443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.464635] RIP: 0033:0x457089 [ 503.467836] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.486747] RSP: 002b:00007f488107fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 503.494461] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457089 [ 503.501728] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c231a [ 503.508996] RBP: 00000000009300a0 R08: 00000000200000d8 R09: 00000000fbad8001 [ 503.516268] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 000000000000000a [ 503.523541] R13: 00000000004d6738 R14: 00000000004c9d0f R15: 0000000000000001 00:25:20 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000380), &(0x7f0000000540)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x117}}, 0x20) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000500)={0x3, &(0x7f0000000980)=[{}, {}, {}]}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback, 0x7}, {0xa, 0x4e23, 0x0, @local}, r4}}, 0x48) write$binfmt_aout(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x18f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) dup(r2) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000300)=0x3) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) accept4$nfc_llcp(r0, 0x0, &(0x7f0000000140), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)) 00:25:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697804", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:20 executing program 3: io_submit(0x0, 0x1, &(0x7f0000001dc0)=[&(0x7f00000014c0)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}]) r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x40000000000002, &(0x7f0000000280)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2040, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000140)={0xef, 0xffffffffffffff63, 0xf, 'queue0\x00', 0xf31}) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:25:20 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect(r1, &(0x7f0000000000)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80) getegid() ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000880)='nr0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000f24000)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 00:25:20 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:20 executing program 2 (fault-call:14 fault-nth:2): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 503.787173] minix_free_inode: bit 1 already cleared 00:25:21 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000000)={0x14, 0x27, 0xffffffffffffffff, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) setsockopt(r0, 0x5, 0x1000, &(0x7f0000000440)="efe2bdb045b13df5d93931b84e1b81cbe6c69f33792e685709fecc5832391910fb127bce4dc4154b001bda22ece16dd5af846bebd55a345be5827eab369cb8f555036ddcdcea19d0a3ee74223791fbca20215e75314931f75029ff905bb2f16abdd131e1d910178ac28b09d77cd2f5e8cfe2bf32034eab645ea0752fcc7306799e8eee426ecbd103a4a91388305613694b748f49f3", 0x95) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x5, 0xffffffffffffff81, 0x9, 0x1, 0xc5, 0x99f7, 0x5, {0x0, @in={{0x2, 0x4e20, @local}}, 0xdd2e, 0x101, 0x3f, 0x100000001, 0x7}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={r2, 0xfff}, 0x8) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000380)={0x100000001, 0x2, 'client0\x00', 0x1, "8eebffbe59c3265a", "bdb295217e906204dfd79c3db80ba6cc1695c9c7d2ecec9fb8d153c700fcb940", 0x8, 0x8}) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 00:25:21 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000240)=0x0) read$eventfd(r0, &(0x7f0000000040), 0xc) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)="10000000f0ffffffff00000000855da0", 0x10}]) [ 504.028475] FAULT_INJECTION: forcing a failure. [ 504.028475] name failslab, interval 1, probability 0, space 0, times 0 [ 504.039958] CPU: 1 PID: 21749 Comm: syz-executor2 Not tainted 4.18.0-next-20180824+ #47 [ 504.048133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.057497] Call Trace: [ 504.060132] dump_stack+0x1c9/0x2b4 [ 504.063787] ? dump_stack_print_info.cold.2+0x52/0x52 [ 504.069017] ? finish_task_switch+0x18a/0x870 [ 504.073551] should_fail.cold.4+0xa/0x11 [ 504.077649] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 504.082783] ? __switch_to_asm+0x40/0x70 [ 504.086893] ? __switch_to_asm+0x34/0x70 [ 504.090986] ? __switch_to_asm+0x40/0x70 [ 504.095102] ? __switch_to_asm+0x34/0x70 [ 504.099190] ? __switch_to_asm+0x40/0x70 [ 504.103269] ? __switch_to_asm+0x34/0x70 [ 504.107364] ? __switch_to_asm+0x34/0x70 [ 504.111459] ? __switch_to_asm+0x40/0x70 [ 504.115536] ? __switch_to_asm+0x40/0x70 [ 504.119633] ? __switch_to_asm+0x34/0x70 [ 504.123717] ? __switch_to_asm+0x40/0x70 00:25:21 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x102, 0x0) mq_timedsend(r1, &(0x7f0000000180)="4a8c592eac480df69079743187dd83e37de886c46a000f1ca3d603eb8a05601c4129aa6b9ce55076b47e5bda2d141324cc3bad747ba4f985bbfc3bf533c087e25b2ccd1df3bf4c82b8d7da93260cb82de460fc05f1c55ac7bc259ed8ecd84fee9a1fccbe3421ece3844a12873d5844d60f5e8fbe5b0a6313e793bdc18ac06457d8846831da559552deb5d7ab8c47b582420c8da84e3f9ea2b8916f0e891747839f53ce6a1d237db0dc64ca919a0cb3afc4ba7d6c2f4e88411d48da1d6d0c3cd79328", 0xc2, 0xffffffffffffffff, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000775000)) [ 504.127799] ? __schedule+0x884/0x1df0 [ 504.127838] ? __sched_text_start+0x8/0x8 [ 504.127856] ? find_held_lock+0x36/0x1c0 [ 504.127898] ? check_same_owner+0x340/0x340 [ 504.127930] __should_failslab+0x124/0x180 [ 504.148559] should_failslab+0x9/0x14 [ 504.152372] kmem_cache_alloc+0x29c/0x710 [ 504.156531] ? mpol_shared_policy_init+0x235/0x670 [ 504.161472] ? current_time+0x72/0x1b0 [ 504.165377] __d_alloc+0xc8/0xd50 [ 504.168876] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 504.173913] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 504.179125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.184672] ? timespec64_trunc+0xea/0x180 [ 504.188926] ? inode_init_owner+0x340/0x340 [ 504.193284] ? _raw_spin_unlock+0x22/0x30 [ 504.197459] ? current_time+0x10b/0x1b0 [ 504.201465] ? __lockdep_init_map+0x105/0x590 [ 504.206037] d_alloc_pseudo+0x1d/0x30 [ 504.209864] alloc_file_pseudo+0x158/0x3f0 [ 504.214130] ? alloc_file+0x430/0x430 [ 504.217949] ? check_same_owner+0x340/0x340 [ 504.222292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 00:25:21 executing program 3: mlockall(0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x6, 0x2, [0x7, 0x1]}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x100, 0x1, 0x204, 0x2, 0x8001, 0x7, 0x6, 0x0, r1}, 0x20) readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6}, &(0x7f0000000400)=0x84) 00:25:21 executing program 7: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) io_setup(0x8, &(0x7f0000000100)=0x0) r4 = dup(r1) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) io_getevents(r3, 0x0, 0x3d6, &(0x7f0000000240), &(0x7f0000000140)={0x0, 0x989680}) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x4000}]) 00:25:21 executing program 6: read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)={0xbf, @time, 0x2d4, {0x0, 0x29ec}}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0605345, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x6, 0x2, 0x7fff}}) r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x41, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00') r3 = syz_open_procfs(r0, &(0x7f0000000000)='oom_score\x00') ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) r4 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa8f456162b139454, r4) tkill(r0, 0x1000000000014) 00:25:21 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 504.227317] ? __check_object_size+0xa3/0x5d7 [ 504.231850] ? kasan_check_write+0x14/0x20 [ 504.236122] __shmem_file_setup.part.48+0x110/0x2a0 [ 504.241150] shmem_file_setup+0x65/0x90 [ 504.245143] __x64_sys_memfd_create+0x2af/0x4f0 [ 504.249863] ? memfd_fcntl+0x1e80/0x1e80 [ 504.253947] do_syscall_64+0x1b9/0x820 [ 504.257854] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 504.263235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 504.268185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.273081] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 504.278123] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 504.283162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.288716] ? prepare_exit_to_usermode+0x291/0x3b0 [ 504.293755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.298653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.303877] RIP: 0033:0x457089 [ 504.307109] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.326023] RSP: 002b:00007f488107fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 504.333761] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457089 [ 504.341071] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c231a 00:25:21 executing program 2 (fault-call:14 fault-nth:3): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 504.341083] RBP: 00000000009300a0 R08: 00000000200000d8 R09: 00000000fbad8001 00:25:21 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x57, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) [ 504.341093] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 000000000000000a [ 504.341103] R13: 00000000004d6738 R14: 00000000004c9d0f R15: 0000000000000002 [ 504.352035] minix_free_inode: bit 1 already cleared [ 504.617859] FAULT_INJECTION: forcing a failure. [ 504.617859] name failslab, interval 1, probability 0, space 0, times 0 [ 504.632524] CPU: 1 PID: 21793 Comm: syz-executor2 Not tainted 4.18.0-next-20180824+ #47 00:25:21 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x3f}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002980)=0xe8) getpgrp(r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000029c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc, &(0x7f00000044c0), 0x0, &(0x7f00000029c0), 0x0, 0x100000}, 0x7fd) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000180)) write$binfmt_misc(r0, &(0x7f0000000440)={'syz1'}, 0x1200e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) [ 504.632537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.632555] Call Trace: [ 504.632581] dump_stack+0x1c9/0x2b4 [ 504.632603] ? dump_stack_print_info.cold.2+0x52/0x52 [ 504.632621] ? should_fail+0x105/0xd86 [ 504.632643] ? write_comp_data+0x22/0x70 [ 504.632664] should_fail.cold.4+0xa/0x11 [ 504.632697] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 504.632714] ? retint_kernel+0x10/0x10 [ 504.632730] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 504.632751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 504.632768] ? print_usage_bug+0xc0/0xc0 [ 504.632795] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 504.632815] ? find_held_lock+0x36/0x1c0 [ 504.632867] ? check_same_owner+0x340/0x340 [ 504.632885] ? lock_downgrade+0x8f0/0x8f0 [ 504.632906] ? rcu_note_context_switch+0x680/0x680 [ 504.632921] ? graph_lock+0x170/0x170 [ 504.632956] __should_failslab+0x124/0x180 [ 504.632977] should_failslab+0x9/0x14 [ 504.633007] kmem_cache_alloc+0x29c/0x710 [ 504.633022] ? kasan_check_write+0x14/0x20 [ 504.633040] ? find_held_lock+0x36/0x1c0 [ 504.633078] __alloc_file+0xac/0x400 [ 504.633098] ? file_free_rcu+0x90/0x90 [ 504.633115] ? lock_downgrade+0x8f0/0x8f0 [ 504.633139] ? kasan_check_read+0x11/0x20 [ 504.633157] ? do_raw_spin_unlock+0xa7/0x2f0 [ 504.633173] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 504.633196] alloc_empty_file+0x72/0x170 [ 504.633215] alloc_file+0x5c/0x430 [ 504.633235] alloc_file_pseudo+0x261/0x3f0 00:25:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f00000000c0)={0xe, 0x1ff, {0x57, 0xffffffffffffffff, 0xfffffffffffffffa, {0x7cf3d059, 0x80d6}, {0x1000, 0x2f}, @rumble={0x6, 0x800}}, {0x51, 0x4, 0x2, {0x9, 0x5}, {0x20, 0x3}, @cond=[{0xb7, 0x7, 0x80000001, 0xfffffffffffffffa, 0x90000000000, 0x6}, {0x1ff, 0x0, 0x81, 0x100000000, 0x200, 0x4}]}}) chroot(&(0x7f0000000380)='./file0/file0\x00') r3 = openat(r2, &(0x7f00006e9ff8)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', &(0x7f00009b9000)="0500de00667300", 0x1008, &(0x7f0000000100)) symlinkat(&(0x7f000001fff7)='./file0/file0\x00', r3, &(0x7f000001fff8)='./file0\x00') renameat2(r3, &(0x7f00000001c0)='./file0/file0/file0/file0\x00', r3, &(0x7f0000284000)='./file0/file0\x00', 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 00:25:21 executing program 7: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="aa3151a38b9318cb0fcffafe"], 0x1) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 00:25:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\t', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 504.633255] ? alloc_file+0x430/0x430 [ 504.633280] ? kasan_check_write+0x14/0x20 [ 504.633304] __shmem_file_setup.part.48+0x110/0x2a0 [ 504.633321] ? shmem_file_setup+0x19/0x90 [ 504.633344] shmem_file_setup+0x65/0x90 [ 504.633367] __x64_sys_memfd_create+0x2af/0x4f0 [ 504.633387] ? memfd_fcntl+0x1e80/0x1e80 [ 504.633405] ? memfd_fcntl+0x1e80/0x1e80 [ 504.633423] ? do_syscall_64+0x179/0x820 [ 504.633447] do_syscall_64+0x1b9/0x820 [ 504.633467] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 504.633488] ? syscall_return_slowpath+0x5e0/0x5e0 [ 504.633507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.633527] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 504.633551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.633571] ? prepare_exit_to_usermode+0x291/0x3b0 [ 504.633597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.633623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.633638] RIP: 0033:0x457089 [ 504.633657] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.633668] RSP: 002b:00007f488107fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 504.633689] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457089 [ 504.633700] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c231a [ 504.633712] RBP: 00000000009300a0 R08: 00000000200000d8 R09: 00000000fbad8001 [ 504.633724] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 000000000000000a [ 504.633735] R13: 00000000004d6738 R14: 00000000004c9d0f R15: 0000000000000003 00:25:22 executing program 2 (fault-call:14 fault-nth:4): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000080)=0x4, 0x4) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8080) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x400008912, &(0x7f0000000080)="0a5cc80700315f85715070") connect$inet6(r3, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x7, &(0x7f0000000000)) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r5, 0x10001) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') madvise(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x20000000000009) fallocate(r6, 0x0, 0x0, 0xe439) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f00000000c0)) 00:25:22 executing program 5: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85714070") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000380)={0x200000000000003, 0x7ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) ioctl$RTC_PIE_ON(r3, 0x7005) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r5) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000140)) socket$inet6(0xa, 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000540)={0x7ff, 0x0, 0xfffffffffffffeff, 0x5, 0x0, 0x3f}) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000240)=ANY=[@ANYBLOB="1d00000000000000861037b6e1743dcb602fe96bac86d5508b0800e1ceaa18ff32ffabc734ab3e52506c2097a2310c4d1a9691b70990be93687fc6dc3cda1068184ece15a5f1451e229868"]) [ 505.234768] FAULT_INJECTION: forcing a failure. [ 505.234768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 505.246906] CPU: 1 PID: 21821 Comm: syz-executor2 Not tainted 4.18.0-next-20180824+ #47 [ 505.255077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.264442] Call Trace: [ 505.267056] dump_stack+0x1c9/0x2b4 [ 505.270714] ? dump_stack_print_info.cold.2+0x52/0x52 [ 505.275921] ? __lock_is_held+0xb5/0x140 [ 505.280008] ? show_ipv4_iface_dhcp_alt_client_id_en+0x80/0x90 [ 505.286013] should_fail.cold.4+0xa/0x11 [ 505.290119] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 505.295244] ? graph_lock+0x170/0x170 [ 505.299055] ? graph_lock+0x170/0x170 [ 505.302887] ? find_held_lock+0x36/0x1c0 [ 505.306964] ? __lock_is_held+0xb5/0x140 [ 505.311050] ? check_same_owner+0x340/0x340 [ 505.315395] ? rcu_note_context_switch+0x680/0x680 [ 505.320346] __alloc_pages_nodemask+0x365/0xd10 [ 505.325026] ? lock_downgrade+0x8f0/0x8f0 [ 505.329226] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 505.334253] ? kasan_check_read+0x11/0x20 [ 505.338410] ? rcu_is_watching+0x8c/0x150 [ 505.342567] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 505.347258] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 505.352283] ? percpu_counter_add_batch+0xf2/0x150 [ 505.357229] ? mpol_shared_policy_lookup+0xf7/0x150 [ 505.362263] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 505.367819] alloc_pages_vma+0xdd/0x540 [ 505.371816] shmem_alloc_page+0xa8/0x190 [ 505.375914] ? shmem_swapin+0x230/0x230 [ 505.379931] shmem_alloc_and_acct_page+0x1f1/0x820 [ 505.384881] ? shmem_getattr+0x2c0/0x2c0 [ 505.388960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.394511] ? event_sched_in.isra.109+0x78f/0xff0 [ 505.399460] shmem_getpage_gfp+0x6ea/0x3ec0 [ 505.403809] ? shmem_writepage+0x13a0/0x13a0 [ 505.408237] ? __lock_acquire+0x7fc/0x5020 [ 505.412854] ? print_usage_bug+0xc0/0xc0 [ 505.416932] ? print_usage_bug+0xc0/0xc0 [ 505.421028] ? mark_held_locks+0x160/0x160 [ 505.425287] ? check_noncircular+0x20/0x20 [ 505.429530] ? __lock_acquire+0x7fc/0x5020 [ 505.433793] ? __lock_acquire+0x7fc/0x5020 [ 505.438047] ? lock_downgrade+0x8f0/0x8f0 [ 505.442218] ? mark_held_locks+0x160/0x160 [ 505.446478] ? print_usage_bug+0xc0/0xc0 [ 505.450545] ? print_usage_bug+0xc0/0xc0 [ 505.454612] ? print_usage_bug+0xc0/0xc0 [ 505.458681] ? __lock_acquire+0x7fc/0x5020 [ 505.462920] ? __lock_acquire+0x7fc/0x5020 [ 505.467186] ? __lock_acquire+0x7fc/0x5020 [ 505.471423] ? graph_lock+0x170/0x170 [ 505.475228] ? print_usage_bug+0xc0/0xc0 [ 505.479297] ? find_held_lock+0x36/0x1c0 [ 505.483367] ? find_held_lock+0x36/0x1c0 [ 505.487439] ? mark_held_locks+0xc9/0x160 [ 505.491597] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 505.496792] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 505.501988] ? lockdep_hardirqs_on+0x421/0x5c0 [ 505.506580] ? trace_hardirqs_on+0xbd/0x2c0 [ 505.510906] ? kasan_check_write+0x14/0x20 [ 505.515148] ? current_time+0x72/0x1b0 [ 505.519037] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 505.524160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 505.529709] ? iov_iter_fault_in_readable+0x23d/0x460 [ 505.534902] ? copy_page_from_iter+0x890/0x890 [ 505.539491] ? __sanitizer_cov_trace_pc+0x37/0x50 [ 505.544343] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 505.549540] shmem_write_begin+0x10a/0x1e0 [ 505.553787] generic_perform_write+0x3ae/0x6c0 [ 505.558390] ? add_page_wait_queue+0x2c0/0x2c0 [ 505.562975] ? file_update_time+0xe4/0x640 [ 505.567215] ? current_time+0x1b0/0x1b0 [ 505.571203] ? down_write+0x8f/0x130 [ 505.574947] __generic_file_write_iter+0x26e/0x630 [ 505.579894] generic_file_write_iter+0x438/0x870 [ 505.584680] ? __generic_file_write_iter+0x630/0x630 [ 505.589805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 505.595351] ? iov_iter_init+0xc9/0x1f0 [ 505.599349] __vfs_write+0x6af/0x9d0 [ 505.603085] ? kernel_read+0x120/0x120 [ 505.606987] ? __lock_is_held+0xb5/0x140 [ 505.611084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.616626] ? __sb_start_write+0x17f/0x300 [ 505.620958] vfs_write+0x1fc/0x560 [ 505.624521] ksys_pwrite64+0x181/0x1b0 [ 505.628414] ? __ia32_sys_pread64+0xf0/0xf0 [ 505.632751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 505.638296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.643666] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 505.648771] ? do_sys_ftruncate+0x44e/0x560 [ 505.653106] __x64_sys_pwrite64+0x97/0xf0 [ 505.657266] do_syscall_64+0x1b9/0x820 [ 505.661183] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 505.666573] ? syscall_return_slowpath+0x5e0/0x5e0 [ 505.671535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.676386] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 505.681407] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 505.686432] ? prepare_exit_to_usermode+0x291/0x3b0 [ 505.691469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.696324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.701520] RIP: 0033:0x410e27 [ 505.704719] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 505.723624] RSP: 002b:00007f488107fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 00:25:22 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="0700000020020000ffffff7f00000000154c83a4a0efa8f66b170ce080e100c8277a5098ead5a35681d4a158829888da15e264b109d833f4f51ec9fac3d49ffc7fcf49c680c3ebd6afcf2e09c8871bb25a4def1dfc4c15362aed63ac0c615e4657d30000000000000000000000000000", @ANYRES64=r2, @ANYRES64=r3/1000+30000, @ANYRES64=r4, @ANYRES64=r5/1000+10000, @ANYBLOB="040000a0010010000300050005010000a7f98bbdfd4b93d9"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4004000) r6 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r6, &(0x7f0000000080)=@can, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r7 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r7, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r8], 0x1) ioctl$sock_inet_SIOCADDRT(r8, 0x890c, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r9 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r7, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r9, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r7, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) [ 505.731336] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000410e27 [ 505.738605] RDX: 0000000000000013 RSI: 0000000020000140 RDI: 000000000000000b [ 505.745874] RBP: 0000000000000000 R08: 00000000200000d8 R09: 00000000fbad8001 [ 505.753147] R10: 0000000000000400 R11: 0000000000000293 R12: 000000000000000b [ 505.760420] R13: 0000000000000001 R14: 00000000004c9d0f R15: 0000000000000004 00:25:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 505.881300] minix_free_inode: bit 1 already cleared [ 505.941835] Unknown ioctl 1074835115 [ 506.130513] Unknown ioctl 1074835115 [ 506.344184] minix_free_inode: bit 1 already cleared [ 506.787038] minix_free_inode: bit 1 already cleared 00:25:24 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="0700000020020000ffffff7f00000000154c83a4a0efa8f66b170ce080e100c8277a5098ead5a35681d4a158829888da15e264b109d833f4f51ec9fac3d49ffc7fcf49c680c3ebd6afcf2e09c8871bb25a4def1dfc4c15362aed63ac0c615e4657d30000000000000000000000000000", @ANYRES64=r2, @ANYRES64=r3/1000+30000, @ANYRES64=r4, @ANYRES64=r5/1000+10000, @ANYBLOB="040000a0010010000300050005010000a7f98bbdfd4b93d9"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4004000) r6 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r6, &(0x7f0000000080)=@can, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r7 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r7, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r8], 0x1) ioctl$sock_inet_SIOCADDRT(r8, 0x890c, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r9 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r7, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r9, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r7, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 00:25:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fcntl$setstatus(r1, 0x4, 0x2400) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x0, 0x9bba, 0x200, 0x7c1}, 0x14) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172daa8fdd1c4c4cf144a23173b6605afb988de7e07195d78f7ddd19a3782fba5bf4af44acfe05900000053c40600", "ee52c10d1e72a9432c222982fcccff747a3131991a00000000000004002000"}) 00:25:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r2, @ANYRES64=r2, @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRESOCT=r0, @ANYRES32=r2, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=r1, @ANYPTR64], @ANYRES16=r1, @ANYRES16=r1, @ANYRES32=r2, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT=r2]], @ANYRES16=r1], 0x40) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000000340)=0x1, 0x4) setsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f0000000000)=0x7, 0x4) recvmsg(r2, &(0x7f0000000180)={&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000003c0)=""/75, 0x4b}, 0x0) 00:25:24 executing program 5: syz_emit_ethernet(0x6f, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080045000061000000000006907800000000e0000001000000000401907800c8d1f6ff071ccdc1188f8692380ebca23c09903661233c6227b94859beea48a6f2c0f1fa8318c20f8b50dabbec7066539b69049834b843944f835743ab82457fb0f3c14d"], &(0x7f0000000000)) 00:25:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:24 executing program 6: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x3, 0x80000) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x111000) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000100)) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="636865638b9cab8fc54578655ff95f1c292b0b68f8063a760a0830c6619d19a8c754493153cb5869b234548430c8c887fde545c2426733368f7ecfbd7b292dec7c268820e8eb28b9"]) 00:25:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:24 executing program 5: setgroups(0x0, &(0x7f0000000200)=[0x0, 0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x10000) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000005280)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000052c0)={0x8, 0x9, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, 0x101}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800}, @ldst={0x2, 0x3, 0x1, 0xb, 0x7, 0x10, 0xfffffffffffffff8}]}, &(0x7f0000000180)='syzkaller\x00', 0x10000, 0x8f, &(0x7f0000000240)=""/143, 0x41100, 0x1, [], r2, 0x7}, 0x48) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000000)=""/92, &(0x7f0000000080)=0x5c) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f00000001c0)=""/51) [ 507.812694] Unknown ioctl 1074835115 [ 507.823384] FAT-fs (loop6): Unrecognized mount option "chec‹œ«ÅExe_ù_)+ hø:v [ 507.823384] 0Æa¨ÇTI1SËXi²4T„0ÈȇýåEÂBg36~Ͻ{)-ì|&ˆ èë(¹" or missing value 00:25:25 executing program 7: sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x10000000000007) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001400)='/dev/qat_adf_ctl\x00', 0x2000000007fffe, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000013c0)='tls\x00', 0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x7b, 0x0) fcntl$setsig(r0, 0xa, 0x6) recvfrom$inet(0xffffffffffffffff, &(0x7f0000002580)=""/177, 0xb1, 0x0, &(0x7f0000002640)={0x2, 0x0, @rand_addr}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200, 0x0) write$vnet(r2, &(0x7f00000012c0)={0x1, {&(0x7f00000001c0)=""/4096, 0x1000, &(0x7f00000011c0)=""/235, 0x3, 0x7}}, 0x68) semget(0x3, 0x3, 0x20) connect$bt_l2cap(r2, &(0x7f0000001340)={0x1f, 0x8001, {0x22a2, 0x7, 0x80000001, 0x8, 0x5, 0x4}, 0xffffffffffffff00, 0x3}, 0xe) 00:25:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0)='IPVS\x00', r0) 00:25:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:25 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, 'proc-vboxnet1*\']'}, {}, {0x20, '9p\x00'}], 0xa, "a79dee66fb5a659599e198ca4b273b60d54d514ba4f4890a8a173dc537687630e0a633c8509acd9265ecc87b02b0a0cbc336f8256d524425f791f481baf31b93aa48244991511bc395fb58ed8c2be9dd23e88035979e2398da356e409ead45"}, 0x80) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfqno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) 00:25:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x240400, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x1000, "15b85e2d4e1c6e8d20d979e9a016f24ea0d8097a9efe94639296e5140b59cc79fb3cad48e7b034253714c674761c48c119430129b28e5b354565b8c7e625beaf1a7f77c92f122b236bc1aed45a8d05d46de34555b82749a5ce5ca738546ce04c342b2393d5daaa986e8cb6ac1732ad941e5e852d579289befc3305856b3dda20c30949d5e55f9295423508bfb634b022d4fa750eb45ac18032517ba7071e6b805adf4b20143cc06216d2644e50749279b8d3661445bd23cd2fdf076b5988f0cc86aa4a7247c4324eb25ff4bfae11fd82a51cddf28d6b89f8c346e96c974fd625e82f3042c54e61ad80f8f31db6f4e1552451791709dbe68a5224edb620d3fdbbed307021b5b7e6b88cbd739e814225c9f7d4c478289374020864f8233f05be806a761f7d0ecaa592c9be876d1b17609af8d8182b7fda1a183df602bd5e813229db02e95c35e0f6edb443e70142343c508737598d6e8bde30b0353c163a038823f09711c456c1a595a8dd7a04fabee9f8c7d1ad29028a39873077f7669fa341e02c7e9ea513e6a0eecc1c16d83fb5c0394c8399ab4deb1c3ba21b962d5885f08e33041dbf65d23b19fe91f0aaa3c1d0000305e13d31d8ea3c08baa82439e7664141119b2e4ff29fcefc177fe7b012c76ed4d57f724efb922a8b11e63f04245f22a828c837d13ff3c173383372455fa026b175dbed3c4b295802663019e01a08c2761a749dd36889176fc0b370f4e00b6cdcec5b05e110ad146aaa19d8c133de4c502fd6a2ac31b873ac00b9e08d9fcf9d246589a0348538ddddde8539ad7466526759c27fba334189681b1729f3e4c32447ac4b80ab4b3ba713346080d797735109e664a8aadd19ff0a2a1fdc2d2c5129fcfa12afc3ea25372c8ef1865ec638e434751995d937af709bf6ec6d82e7655a242da750336e1ce65385e4fdfefe65dbb8c44cc8bd780f88fd51eff1bb5d595e71795ad5e7af770976a6c94517840e042b2798b717db7159c9be66c057e77b84a0c63ef2c1d9b09c01019ceb258b328b771eab64d1e190d45f93d09c73b446341c1d367c9292c02513efe03b91b0dffb05fd96ef29fdae402a66b4808d7293c196dd2eb95bf735b9f6772c0cf8e5ac9117265ea3ca145f5f735f69c8eabfb584682d21630e35297bb9966d502f64c5b8cc55a84fee9633b8d5d1fb3c2e8ec98ba4e071cc5ba0be93ae56d237fdf1a0b155b8ce01389204c86486d2e1c2fd616b25cd5f8d3c1edf2164024e5fe1ebadbca01c78207a687deff6b3fc0c9ebe6130bd4da19970f350ec679db44aefb511405d0d89dc30295cd0293b8626313a4fed121251bb549ca9bfbe396829f444814af5823db0978c4420e7f1abc404007cd6d6d9509b415163a1d0c024066399c8a8023e6b52d861c77db818dadca1e6c57e0f10c9f950ee1d33eff5c1292264437a393add9b4fcdacbfb6039a84fd61b0e300e73ac7c81339b6fad38bee67f3b4d4d2310b7eabfac532d0765fdd1fc05381679798ac9e5d3eea715a9e6dec4ae15dac3065f2a301f69db4ed09b3afd08a762ea742e59b18ee351f05ebdc56365140a5187e4534e4b72d5461c6c618095d7c9db0bdaf11e6a66e727e5e9414a049b19afc6f0bbef4928c221de2dcfeb189d12229bcada6b3455bce7bedaa810411c98a80cd5bccb17db8087ec7a82fb3da59eca88e35286cd16f0589bb5ebda58c58d476bbfb986d9cb3eadd159656466d7e440732019abdc470afd878098b3ce4b14cf06e2ad2f1c2ff98bd2ea7edc9f3ecd5a98f9fc0f5471b029c15d8da07c17e435bd987725f761a85dfe67c867bc2b4f3930fc44bc6d723658048b1090c66dc0a999e52a3396d03756193e3d5e378559b1123cd585c97c7336d628469524ccb9f13fc6a8e2f319e7e41f71222337efe7be2adf78564270a8c94299a638fcb9074c4976ce24959199bd386784feaf7e71dd3d1da3c6a9daea5816ebfacc59a75a3fb5388c4714519cddc474854ca25b2dfbb5f7e40e76f4c238f6d1140c4695526ca78ab43d96c1a2ccab71b384b8fb5aafb4c28fb8b452c0fdab6c599cf642f11bbaac6c72c3535f6d86a7e5b1f10b2263303f71a788f00b5383cf78203020e9abc28ad6918acba24abe516c7ec6ca2feed89de1e22de299d4c071d5cff0951f95e86c0c91cc5715789c3471229f4d39194172d231b1f3454ed09dbc008c5b8373143a7508fe7be1410444db185e23db65b35e0a406db3dc49967f77c9e8b7a930663fc2f20da50df0d4a046b2ed05bdc690c4c58ab632194406b197665adb738597efcc43123de0d261926fc1472cb77ae8b5f7f1c0053ec26c2ed6c04bfca1829527dd5029c6e25045e8d80ff47020c3ca8f2e5035cb6746b4a34923528d1e344ae037f378424392d431de1cb3b97fd69b013c3310e8b2018a60e528a8b35cd2940800cb3b89a8ed5a1cfcef64c02dfcf6abcac6d9aa8b4546c7f1fa5d0aaae953fc2ebac05b21e98143ba80bd525375669ce60af737b351155661bd8b6f622cb4856909bdbe7a765f436d03759f6fa8794ae2c9a8ccbfa12e781ec9f82c84a4c90af9bc0cf09126a8460222e860ac06a32de64140096978c1ad08996372f2d258507d1660573fbf24055c0708a602423a624f1773bddecf5e6240b2cad14b7b5f07eabcfc6e8017bbdf294391aa14b481ec9c39c55895e56d8223263f17c6515012f99ed2076b57f0998d1e4595adc3cf6aada6cc9d0dc8889c7dfcccbe61508a6372217a1daf86b7e6c671133a4b4903b3367a64111b962c8a6acac5baf5b94d5935d1c4ba95ea691f6f84a71a9099f037deaaa615d1cfc954d94696ceffe33582f2df2876784fc9dc04a4458af660e147fa95bf828428ca955ff1260fbefb001ada7cccaa045ed2d8eb2ab8d60f26ef444e1d6c7eac15e2a8d0635666bb1a44e5bdb62d082a3659043a0fc51a8fc4e43aa282bc085424e610664253c21c7e8179cf711cf24427ca3e1bdf638361cb604a32ab08fa3c002109d54cac184bfabe36f41b7e89266b03cf84e00003ea8cee21499ca041ad60a567dfa5af252d28fef6e59ab5b6a9aa3a389a815a0a8d79af5a536742ae40f1c7785365c5fec603f3825cab5bca9de268cf4f6b028a74f2155fee28538361b6384f5d215c96cfd328d00658a844f38d289c4bb1e78d35de7f454af5e7037d02194fdfab7148ad35b1dd87f871887627a8a154ddb6c792ca6263d3289a9fcd3ce3030f672153bf4141193b72e7f325585a98b203aa95d64a0c3c5dfb658eab8ecfb7f193ee05b8933ee00f79a7155c0632df9845237463a1c60fac9750a85d710e5afe971a7003e3b102f572ddddf1d56890a11394a747731b7784b6a8c043698e3beb973ed5a02650c953f06973708b539e1d4aec1bb0c535a1009cd82e2a54e312998d0c84b8b387e7ed469d416845a6b79ac8164b2bc056e54835942f2f6b4732c1fdf44cdcd5da2c70c3ce726d7507137f5c0bd84100664299c0692a99fc44a9821a3c4df5c409f00cda96d3ab1d856192eedb614b41bfc519cba14e3a510f5bb28ad9bdee85f178d41cfd425b7dab965e25311f1c6ca06f7444957f40feb426ae118c28182d2de4855d464a267523b97412a16c9cc2f47783af84038951d2c56387ce905f2393321e22a60b79149e2f4ca8be7e9fa8cb0d9ab59f78e5255b0c263f142357a934c8eed51dd8f8174d12ff341210d0e52baba8a4f561f6bc7ac881c71353a2479de5f45150bd2f26327966946d3dfc8f6aaee6b07f15996324340163b19735f5aaf3572da5026483691d125e978c599cee3a6a995ee1664e560cf9ee9a22c9bd4a16566527e856f9a95302257166084d100cd779cdfa728e7eec602b7447c2ff376a5e08598f959dbbd989822e26dad3f5439cbd1c3434508565073203f89a3a48a56fcf724af87499a9ed1c8557378de054d016cb4e4422e60efc142407230fff0d0ad01f2351b9ce0391b0abf11a3d7d1c1cd8e0a8006eb470eac0a9614fc592fad03bf48780b1ee2e875b14f47ece68ee380536230d82547ddabdf15bb4517652f60c4e05909dc6afe9dcf6a6edca0d17e18964db15eb1a5c7a2097c15211fe672e80982aca41552cdc2c5cf9adae83fbd159dffc3bfeee340d44aa15d13b7f7a188dd5db1bdc32cc7934e825490c05579aa7d5f27362de57b42cdeab700aafd3ad486740b6dedf07109e85e1a5d524cecd0f357b41d53594fa40fb218c6916640d30fd3e75c62c8c374c37250d08903807263673d478a055569616e6da62cbd28a29fe8479db08103d2d8d3fc8f12f80eaf3eea1b64fb76b97e159623d01aa51289e9928b35b36656b07fc6507994288dd640aa92f9653401dce0e91c5243d79f6a3ac8bb585c0575fc631f4b2ff8aacc6718a3ed8900da0a95108f38a60374d0b25479190a918a2a30bdd0dc854b0fa978b7b9f0454b474c165f50ec41bae826527c38b4039a48e6f2b8d249446998216b294217cad16c8b49accbc2d40d0a21e87554910da1e2aecbbc349ceac390a2fb7f6caf076d858fb9d683fce7dc4e42cb880ce09c075cd9bc63daf809bb64888a2aa6dfd219760ce33e2283933bb19102dbc54a1845e9c29577ef7a0e707fd247c469691a9fa2dfff8e36d2ab80be765ac289b073d95b2b3ee226073c89d267bd91b64c2dfd801fec74046ed130775e602ec359b5fa2c981194761af4d1e71dae6991bb72237a680df4fcf644f03a09126f39046eb6fecd24bf4d975ca67ca3712d7e0dc4aeac78963cedc3efba4ea7c48cc72a36239fabd3eb830816ac51763d6739bb476a814c6c713001db761cbcab6bedd48c25846257d671f3c3127bb6b45cfd3ea04aa8f5f189cdcfa274169be0b3a24d36acb9e13c98f3b7a963f08a744aa52cb6557f8e8de17779b34ff3f166dbd9758c726c235e2344609cb95a66d8193a6a9141cfffe33978fc18f02d4d910cd64bf525e638d2b2d9fc6bd2f9c72f029f8438fc85bd0d37d50232051207b0a476262d4667362d81e3c69200fa69f3b9eabfdd59549ef8299926b23ac4a7ed329d23391d6f89074b8e61c11d1d4751b8e3e1ac0e49d0a8c3ac3dac5b11bb2d8150ed1d3be7ef2b7f45cd7f4870ac6c7aad818e730c682e922cf3c419cf1f4359741bbd45b17e516a387cd5e8c8fee5aea72b25acdd1dc1690f5422bbbedb5fd0f26e6fadc131cb33c1aa960403f2fc55fee739c127614240f3c4369bb1e6f17c18559aa5c0a45911d4fcc84d417db383a02b4e10b74ff2ccd09abb1d33a3deee63b0be417faf4b5ebefdc5c3f86ca91fcb1fc0d3bf8282af0f861a85dface310cd3d04da28c2b7b682bd65b1119876d424a11c61b130e49d74ad0a75f4e13c8393ad261aaa517941d3bfc6c3a80d871c537d94b2d5200cb07dcba2e043c5f2ff9986c73a331002d221a3e216c24ed19312703db02a52c82ace229d72af1f231703fb2696d1de48983ebbad2b2d588096eb6a8dc01ae67d6251f14d3ebeca6ff62a205aea9e4b4a559a697d97808db1f9a5a2193e659ef356d80aad4d47292ca9085d255245efb1388403250ad96c44f08c6592e916ce26c829059ad00d1562365a6c9e388e4b208fd84f6ab33e22136f8adc03471e57e046d4c4b716f4060a7baed74fedbb8b3a76d4e7460d93710b18a9ab1b3f8deb207c5f9973e180a3d897f3584445361659f4a3d398963b9309e04f6e88accf1a4b848525317b4cf24b18215a4dd542edc8d8551d10fbff692be2b04902a5a93832f1bb86"}, &(0x7f0000000080)=0x1008) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000000c0)={r3, 0x6}, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000004f000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="26410f300f01c90f06643e400f01c9420f758e000000002ef3400fb8e566baf80cb8ac8abd80ef66bafc0cedd2fe0f01ca66ba4000ec", 0x36}], 0x1, 0x0, &(0x7f00000001c0), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060"}], 0xaaaaaaaaaaaa84c, 0x0, &(0x7f0000000140), 0x10000000000000c5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f00000001c0)="0f0f280dbaf80c66b8561eac8666efbafc0cecd8d80f01720cbad10466ed26900f019d848066b92902000066b80800000066ba000000000f300f01d10f013b", 0x3f}], 0x1, 0x0, &(0x7f0000000300), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x840, 0x0) ioctl$VHOST_SET_OWNER(r5, 0xaf01, 0x0) 00:25:25 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0xa8280) sendto$inet(r1, &(0x7f00000000c0)="ba49f6493f287b164e9751dd67d70f158b57c5ee5430f80e87cb503dab6916fb4c4384f3537decf08a8573a95360cc4a5544f7d131099b29fcbc32570003d9cee38d99f73cd4640f59df03b909763db22b99fa6ae50d130029", 0x59, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x35, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}, 0x10) [ 508.145198] minix_free_inode: bit 1 already cleared 00:25:25 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f000049b000/0x2000)=nil, 0x2000) r0 = gettid() sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x7cd) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000200)={{&(0x7f0000385000/0x1000)=nil, 0x1000}, 0x1}) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x3) 00:25:25 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f00000000c0)=@xdp, &(0x7f0000000140)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r2, @in={{0x2, 0x4e20}}, 0x6892e976, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r3, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) recvmsg$kcm(r1, &(0x7f0000001540)={&(0x7f0000000300)=@rc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/168, 0xa8}, {&(0x7f0000000440)=""/195, 0xc3}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0xb41}, 0x100) sendto$inet(r3, &(0x7f0000000100), 0xfe68, 0x0, 0x0, 0x19f) [ 508.398106] Unknown ioctl 44801 [ 508.458263] Unknown ioctl 44801 [ 508.493416] 9pnet: Insufficient options for proto=fd [ 508.570917] 9pnet: Insufficient options for proto=fd 00:25:25 executing program 6: r0 = eventfd2(0x200000001, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000001500)=""/231, 0x4}], 0x2) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000900)=@nfc, &(0x7f0000000980)=0x80, 0x80800) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000009c0)=0x7f, 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x622, 0x0) setns(r2, 0x54000000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'ifb0\x00', 0x3}, 0x18) io_setup(0x3f, &(0x7f0000000040)=0x0) io_submit(r3, 0x3, &(0x7f0000000340)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffff, r0, &(0x7f0000000080)="c313cf84a941bcfa64d9ff0509ce2f", 0xfffffffffffffe16, 0xc0000000000, 0x0, 0x1, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xa, 0x8000, r2, &(0x7f0000000780)="839686a4f105c1f3beeff800e03f9a33df15d1ae16c2057762f5f70fd90126d16a2486a320ce11f11d347b14fc65082cd8b9b28e98adabfc3d48f51f0eebf8ac09ea2b6153eaa2b55bd3235902f8dcbad1aee2dd4fe87c55c76802d7c2061c93eb6cbb97ffcfc145fb01", 0xfcd5, 0x100000000, 0x0, 0x1, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f0000000200)="b54feb7a21c33aedec60c8a0ee4a26605ee748f76926b9e61543752855f4b533a6cc071831cfb382e57f71a4b381cbef4b57f5050aa283d61d872158458fc82ac4595ca4c3a17a0daa355850ffe71a81ea47f9d3354bd9a252b298bcaa76fea0c4532bba3a52817da07db5d33caa31b15ced022a05fbf6f154292a8ced401acc35070b4a6c785a5c36746cb9d4f73dbf78998aabedb7e84f5420f72c5dbb708bb554a5123bd01d3eee58182aa1e8b9bcd88087a52007a98b41035196013a608503cb4417c1f88a8c79136169e59d936f9f0aa64b6effb0171b2b330177e3cd6a143550eb5523abf59bcfff", 0xeb, 0x100000000, 0x0, 0x0, r2}]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000840)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1ff}}}, 0x90) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000380)={"52bae32e2785d52075fe6278cdd0910067dc0a67e6910585255a91000665c605573b37196f631ae56be47d37d4e0e11a8dbf0b9c1915785ce0392d53809b19a3a8e1a03714b0a1e2bb19bc700c04709c6c355465674ef87ae6955c9019bfb7a255f8d20710e6d8c3a8561fe5621a42933a86a8b6efe66b8b23da279cc2db3700dfc3c028b1b5d63a6b252ec47c10b2fabd91b0d69b233397853d39bd64019d81b937a0e8b2bcc4e8186a60562b1aa1b4d64ea0a2e82f14138e7be7bec5a7b0474dac792197e9690deaf95a31abce70c758e53b3416254fcbec7c233760a4cc990a5ef8b0f85ac566e08db57b81d63ac74d4b1bbacf9cf5d045a62ae86c8d62fb6333743b985b71914b720914f8fd12dace9baf033c137d82295f29c4cbb873475b3b00646adf6dc057d33c6e4feee11bcdbf3d0fdb7680aed1d89f1437a4a227158fbb091c7eb9cfb9666caf4184c9959ce8792c6d3176d506f60472bff77e9260a72241c630eee6c50df5ba7762b620c90edfe74b850e2db85d8ac6b26a337462ed098e36608b1e0ceeca72f4b8e141a36399deafd20d1bca334ff21ed8b5769b389f5a0cf473327e9fbe24055dd5d2cc92d9f29b4a796f5f170b24aa56d4dc0757cb401f9e0351bdc02d44abc8d1b642449ecd4bc176574e04c59039b618dc40b34271a982df24c32a3b9cd1ea4fba51f2ad4dd1f086232151196ad026e976986b8a0913e7c696b8fe620269f43283020dbfb53ee9f273ccacf70ce03c14d3d2582829169d7c631fbccfc8cf7204e2470b531c8f9de0e5a3253d51a3a0d9373f79b5d8deda51025217245e6641eba1203c2ab17281f172253fc5bc171f151c4f7f16a1b14351ebd4686ed24251f7e66e6a0e09d2ccb61441560dfc1f3d680e5b01284f4b666b7a1236955fa79484c1346d8923a3aebd6b583a424a0d0d5b8923439aae8e50b5c83586a45bf68e7522abf09e06a9046e59c7da2fd8e3bc002acb9f99e9d9730e21c67efc6e3fece90f63af0dbb278a29262be55cef1fe2c9b17a036c4f8222fbe17c7cc941a1ecb0d66ef08add94dc196461fde89f9d6e6c08f1f1db600996d89f8e82a7448472dabfc4380d723928fb55129fbd28a9193b7f307c2f569fa8f7dc6d27dea2da50046db90e8d3e4f666969df43f4306c9b0c0e413fbc4b765504c17358a1be28de6727825b338474d3ab96a87c0091ebc83c4ed59477c20ce4133de42f53bdb92afae3b7ff8353b52fc67a4bfd2c3a8ab69853216fce78e8408c0de77ec55cea015936cd981004c5cb143d52b14bcc0449bc9a50ef77a6a25c7d76d2c5e983cfd7a3f8729c6f08df0526bbbf3af864527520d5c9ce31653798eb3467bd95a73b9addc939ab87e56fe8a1c67f5145aed873614bfd6d3d431bb2a93615f55751a800246c1413e11b21903ec515cc6fe81a57624c"}) sync_file_range(r0, 0x10001, 0x69a, 0x7) 00:25:25 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000480), &(0x7f0000000580)}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) rt_sigqueueinfo(r1, 0x13, &(0x7f00000000c0)) 00:25:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 508.695173] minix_free_inode: bit 1 already cleared 00:25:25 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0)=0x31, 0x4) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) getitimer(0x2, &(0x7f0000000040)) ioctl(r0, 0x8, &(0x7f00000000c0)="3da42fd27b0eae25f091298e99a1cec2f67c5bf325e7ceec1cc10f3895623fc6f9fa215f53c7995b77ffd3f9c6021199aa0cf5c78f38132b0b31351b31c7a2f58664470c047c82ccea3a796de826") ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x4e23, 0x9, @remote, 0x6}}, {{0xa, 0x4e20, 0xfffffffffffffff8, @local, 0x8}}}, 0xffffffffffffff82) 00:25:25 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000580)={0x77359400}, 0x10) r2 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x8001) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000780)=0x20001, 0xfffffe45) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000540)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000640)={0x0, 0x5}, &(0x7f00000006c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={r5, @in6={{0xa, 0x4e23, 0x400, @local, 0x14d}}, 0xfa, 0x8, 0xfffffffffffffffd, 0x6375, 0xe7}, &(0x7f0000000740)=0x98) fchownat(r2, &(0x7f00000003c0)='./file0\x00', r3, r4, 0x1100) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000680)='./file0\x00', 0x800000000) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x1000000000, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',7fdno=', @ANYRESHEX=r1, @ANYBLOB]) write$P9_RREADDIR(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2a00000029010000000000000000000000100000000000000000000000d3b18a240000000000000003c65f729d702ff739a0bc29827c1c4bc5"], 0x2a) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="3d000000000000000000000000000063fefc4b2523031a05701b9ff70966709596b9386aeae724134b73cdc758475a0126b4e029f71153b7c9c0d7d438ce428df88e02205339e0a6f621f72f3d0525151ad78848fa192167fa2a25d210e78f0839eaee9c", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r6, 0x4c03, &(0x7f00000007c0)) ioctl$TIOCSBRK(r7, 0x5427) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) 00:25:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix-', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e69ffff", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:26 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x1931, 0x2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) get_robust_list(r1, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)}}, &(0x7f0000000380)=0x18) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x80000000, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r2, 0x10001}, 0x8) accept4(r0, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0x80, 0x80000) syz_open_pts(r0, 0x800) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) socket$inet6_sctp(0xa, 0x5, 0x84) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2) [ 508.829110] minix_free_inode: bit 1 already cleared [ 508.841224] minix_free_inode: bit 1 already cleared 00:25:26 executing program 7: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001a80)={0x0, @rand_addr=0x10001, @local}, 0xc) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0), 0x10) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x6, 0x100) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000200)={0x32, @multicast1, 0x4e22, 0x3, 'wlc\x00', 0x31, 0x3ff, 0x101}, 0x2c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 00:25:26 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000003031f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000001c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x4c4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x200000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={0x0, r2, 0xf, 0x2}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0xc, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x2e}, @alu={0x7, 0x2, 0xf, 0x9, 0x5, 0x4, 0x4}, @jmp={0x5, 0x3f, 0xd, 0x0, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x5, 0xb, 0x7, 0xf, 0xfffffffffffffff0, 0x4}, @generic={0x9, 0x1, 0x101, 0x9}], &(0x7f00000000c0)='GPL\x00', 0x800, 0x7, &(0x7f0000000100)=""/7, 0x41100, 0x1, [], r1, 0xf}, 0x48) recvfrom$inet(r0, &(0x7f00000002c0)=""/154, 0x9a, 0x41, &(0x7f0000000380)={0x2, 0x4e23, @local}, 0x10) 00:25:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[], 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udp6\x00') readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/83, 0x53) r3 = socket$inet6(0xa, 0x2, 0x2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendfile(r0, r2, &(0x7f0000000040), 0x80000002) 00:25:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x20003, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x2}, &(0x7f0000000280)=0x8) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x400000) 00:25:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 509.153451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 509.194292] minix_free_inode: bit 1 already cleared 00:25:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x5, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x96, "2ea40cdcbec0d88d60bfe801ef288924b3ad6e82d47226521348a03c232149a74cf6830cf4e127d9cb9633f75a6e4052f97dbfac7fbd47e65dca86488b508ebc87245e8d6140387182bd07a47b7a4518e99617dbd988e6c47b5b42150dc4ef2eb92ee071cd60f560e7d00e70ad04b86d64b6834d0ec2e00a09d4b283e844a6c73f9dbe64a4fcdb2135b2073838e858f7fe605f394ba4"}, &(0x7f0000000080)=0x9e) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x7}, 0x8) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={&(0x7f0000024000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x25, 0x1aff, 0x0, 0x0, {0x3}}, 0x14}}, 0x2) [ 509.246158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 00:25:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = epoll_create(0x8001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x8}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002200011c000000000000000000000000"], 0x14}}, 0x3) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000240), 0xc, &(0x7f0000000180)={&(0x7f0000009f80)=@delpolicy={0x50, 0x14, 0x231, 0x0, 0x0, {{@in6=@loopback, @in=@loopback}, 0x6e6bb6}}, 0x50}, 0x8}, 0x0) 00:25:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697817", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x12) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="390000001300090065000000000000007f008040040000004600010700000014190004000400210003f5000000000000000000000000000000", 0x39}], 0x1) socketpair$inet6(0xa, 0x80006, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='!\x00', 0xffffffffffffff9c}, 0x10) accept4$unix(r2, &(0x7f0000000180), &(0x7f0000000200)=0x6e, 0x0) inotify_init1(0x800) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x9, 0x1, 0x0, 0xfffffffffffffff9}, 0x8) 00:25:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x2, 0x0) mmap(&(0x7f00000b3000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x34, r0, 0xfffffffffffffffc) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000100)=""/202) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000200)) 00:25:26 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x36, &(0x7f0000000240)=""/144, &(0x7f00000000c0)=0x90) 00:25:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x5, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x96, "2ea40cdcbec0d88d60bfe801ef288924b3ad6e82d47226521348a03c232149a74cf6830cf4e127d9cb9633f75a6e4052f97dbfac7fbd47e65dca86488b508ebc87245e8d6140387182bd07a47b7a4518e99617dbd988e6c47b5b42150dc4ef2eb92ee071cd60f560e7d00e70ad04b86d64b6834d0ec2e00a09d4b283e844a6c73f9dbe64a4fcdb2135b2073838e858f7fe605f394ba4"}, &(0x7f0000000080)=0x9e) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x7}, 0x8) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={&(0x7f0000024000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x25, 0x1aff, 0x0, 0x0, {0x3}}, 0x14}}, 0x2) 00:25:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 509.733123] minix_free_inode: bit 1 already cleared 00:25:26 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCGIFADDR(r0, 0x400448e4, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x4e23, @multicast2}}) 00:25:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:27 executing program 7: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x9, 0x8) munmap(&(0x7f0000a93000/0x3000)=nil, 0x3000) mremap(&(0x7f0000a94000/0x4000)=nil, 0x4000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) 00:25:27 executing program 6: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x20200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') close(r2) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000100)={0x100000000, 0x5}) 00:25:27 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) 00:25:27 executing program 0: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000100)={0x5, 0x3, 0x8, 0x0, 'syz1\x00', 0x800}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) tee(0xffffffffffffffff, r1, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = getpgrp(0xffffffffffffffff) sched_getattr(r2, &(0x7f00000000c0), 0x30, 0x0) select(0x40, &(0x7f00000007c0), &(0x7f0000000800)={0x2a, 0x0, 0x0, 0xee}, &(0x7f0000000840), &(0x7f0000000880)={0x77359400}) 00:25:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x0, @loopback}}, 0x1e) setsockopt$inet6_dccp_buf(r1, 0x21, 0xc0, &(0x7f00000002c0)="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", 0x1000) bind(r1, &(0x7f0000670000)=@generic={0x1e, "02fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 00:25:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 510.218219] minix_free_inode: bit 1 already cleared 00:25:27 executing program 5: io_setup(0x803, &(0x7f00000000c0)=0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000100)={0x9b0, 0x8, 0x1, 0xffffffffffffff9c}) r2 = dup(0xffffffffffffff9c) io_cancel(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xe, 0x8, r1, &(0x7f0000000180), 0x0, 0x5, 0x0, 0x1, r2}, &(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f00000004c0)=@nfc_llcp, 0x80, &(0x7f0000002540)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, &(0x7f0000006300)={0x77359400}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x180) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000080)) r4 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000180)={0x20}, 0x4) setsockopt$sock_void(r4, 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000001640)={0x0, 0x60000000000}, &(0x7f0000001680)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000016c0)={r5, 0x8001}, &(0x7f0000001700)=0x8) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') write$P9_RCREATE(r6, &(0x7f0000000240)={0x18, 0x73, 0x1, {{0xa8}, 0x1}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000001540)={0x7, 0x2, {0x0, 0x1, 0xb4, 0x1, 0x926}}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f00000015c0), &(0x7f0000001600)=0x4) preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0xcc6fcf6127de25e, 0x0) 00:25:27 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x6000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000640)={0x7, 0x7, 0xff, 0x3, '\x00', 0x3}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) umount2(&(0x7f0000000500)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x480400, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000400), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RCLUNK(r3, &(0x7f0000000400)={0x7, 0x79, 0x1}, 0x7) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) 00:25:27 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) socketpair$inet(0x2, 0x0, 0x400, &(0x7f0000002b80)={0xffffffffffffffff}) setresuid(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/exec\x00') clock_adjtime(0x0, &(0x7f0000000600)={0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x8, 0x0, 0x40, 0x0, 0x2, 0x0, 0x1}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000000c0)) lseek(r0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) listen(r0, 0x1000) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x80, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0xfffffff5, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 00:25:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:27 executing program 6: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000002900000008000000000000da"], 0x14}}], 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 00:25:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x1, 0x4) msgget$private(0x0, 0x13) msgget(0x0, 0x8) r0 = msgget$private(0x0, 0x220) r1 = getpgrp(0x0) setpriority(0x2, r1, 0xaac) msgctl$IPC_RMID(r0, 0x3) 00:25:27 executing program 5: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003c80)=0xffffffff, 0x4) r0 = open(&(0x7f0000000000)='./file1\x00', 0x101000, 0x100) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)=""/214) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 510.638184] minix_free_inode: bit 1 already cleared 00:25:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/28, 0xffffffffffffffaf) mlockall(0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb79229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a400", 0xa9824f69d1376633, 0x10800a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7}) close(0xffffffffffffffff) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000140)=0x9, 0x8) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x40000, 0x1b4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) 00:25:27 executing program 5: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x10001}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={r0, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{0xd7, 0xaf}, {0x7fffffff}, 0x4, 0x4, 0x157c}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) io_setup(0xfffffffffffffff8, &(0x7f0000000300)=0x0) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000580)="405ebe3dfb30260292985f5d9597714a993f0d02e4794c0821abf8ee29f531183175f7a3632581d54d1219589cb4a8792ad8f3a258ddf1049d0761c4f1a941715f600fb41554760a48ac9916c6cf5154383f70e5be99d2544fa4432ab9da3edb8bd09ccf32e7a57fd7975f054df7ae9fac67c32ddf995dc7d6620598006daf679dc621785717b21db4df4cc28acaeae4bb2a3bbe643a2c58c0c01979338d03e8484d0417ceae1b1599b19fe2503da4a41d69a7cc1b", 0xb5, 0xfffffffffffffffc) keyctl$update(0x2, r4, &(0x7f0000000640)="2e7515c7811079d2b3635f90be67210905e41359d51112c806db60a4f3512c3e1a2566225d3eb9838367ef2ca21fd425d26f1997675baf6d0f08a628e0162459d22f375376f88c3b1a551790a07b46c25caf9966e22a0ab87dafcdea273f6b2060e5f523700d4a7d9f1728e8431e244bc54877af6c243f425aac7196b2e836547d3d013f73d0ab02c23ddf6286da4f5c8bb8fd642b39dfa305", 0x99) io_cancel(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x80000001, 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x101}, &(0x7f00000003c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 00:25:28 executing program 3: unshare(0x400) pselect6(0x2e7, &(0x7f0000f33fc0)={0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00000000c0), 0x8}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x80) write$sndseq(r0, &(0x7f0000000100)=[{0x8, 0x10, 0x0, 0xe449, @tick=0x1, {0x8, 0x100000001}, {0xffff}, @raw32={[0x7e, 0x18, 0x3]}}, {0x1000, 0x0, 0x6, 0xff, @tick=0x81, {0x0, 0x28}, {0x0, 0x40}, @result={0x10000, 0x5}}, {0x2, 0xd7, 0x6, 0x100, @tick=0x10000, {0x3}, {0x7, 0xffffffff80000001}, @connect={{0x80000001, 0x9}, {0x1, 0x7368}}}, {0x4, 0x9, 0x4, 0x4, @tick=0x1, {0xfffffffffffffffa}, {0x3, 0x7}, @result={0x6, 0x3}}, {0x0, 0x40, 0x3ff, 0x632, @tick=0xffff, {0x300000000, 0xf2}, {0x7, 0x3}, @queue={0xfffffffffffffffb, {0xb5, 0x4}}}, {0x9, 0x3, 0xfffffffffffffffe, 0x0, @tick=0x8000, {0x7, 0x7}, {0x2704, 0x8001}, @raw32={[0xf0e, 0x8, 0x6d5]}}, {0x2, 0x7, 0x14, 0x3, @tick=0x10001, {0x4, 0x5}, {0x6, 0x3f}, @raw8={"48bb812e961f9a34883b7cfe"}}], 0x150) 00:25:28 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0xa6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x80008) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00007ce000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="0f209bea660fb3424500c4e179f7d1660f2054b8004800000f23c80f21f835040060000f23f8f20f2c256600000066ba420066ed66baf80cb8719ce883ef66bafc0cecb9800000c00f3235001000000f300f35", 0x53}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_RUN(r5, 0xae80, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='/dev/audio\x00'}, 0x10) 00:25:28 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x200400, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xe0, 0x800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x10010000}, &(0x7f00000000c0)=0xfffffe11) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r1, 0x175}, 0x8) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x10000000003, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000080)=0xfff, 0x4) 00:25:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:28 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 510.914373] minix_free_inode: bit 1 already cleared [ 510.972317] IPVS: ftp: loaded support on port[0] = 21 00:25:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") clone(0x200, &(0x7f0000000180), &(0x7f0000000300), &(0x7f00000000c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000000200)) r1 = gettid() r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000008ff8)=0x3f) write$P9_RAUTH(r2, &(0x7f0000000000)={0x14}, 0x14) read$eventfd(r2, &(0x7f0000000080), 0x8) recvfrom$unix(r4, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x8) fcntl$setown(r3, 0x8, r1) fcntl$setsig(r3, 0xa, 0x12) dup2(r3, r5) tkill(r1, 0x16) 00:25:28 executing program 3: r0 = memfd_create(&(0x7f0000000040)='iocharset', 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'cp852'}}]}) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rc, &(0x7f0000000040)=0x80, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0000002600200300000000dbdf25000000f60059345619ea0532781becbc9320020015cccc08620c0b937a620096ffc5b6c0e8f4dbba03796b8d37df208586545d81c08baf4a23f9122d5bfa7d3c72368a9250c212817b000000000000003e56cc4b6df0872ac4b9b61cc016dc9c3a4293327f23b3192bce8a386246ca192a16ec49215bd659d7e2209e1652a5288c771689840fb7ed647c5ccdbdd8319b62286379365b3c5a95"], 0x1}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(r2, &(0x7f00000003c0)=@xdp={0x2c, 0x0, 0x0, 0x3d}, 0x80) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = gettid() ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000800)={{0x0, 0x3, 0x100000000, 0x0, 0x7ff}, 0x2, 0xffffffff}) fcntl$setown(r2, 0x8, r5) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200), &(0x7f00000007c0)=0x4) ioctl$LOOP_CTL_REMOVE(r4, 0x5421, 0x0) r6 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000680), 0x0, 0xfffffffffffffffb) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x117, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000680)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r7}}, 0x18) keyctl$setperm(0x5, r6, 0x12010100) sendmsg(r2, &(0x7f00000008c0)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000880), 0x0, &(0x7f0000003b40)=[{0x88, 0x107, 0x5, "8a9682aa42761273de4d605a9dc106bf46f4daa17790408d5048b282dbaf827a99ac612f1292ab710d09477c1902cbd9f16a07cf1b8945c6075b6af6f99756108e599195ffece6e8547cc7b15781a6fb08bc36c76d84ab0e265fa7410a30495015a7aa16e7a82586378fc994a43f01c489"}], 0x88, 0x20040000}, 0x8001) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) sendto$unix(r8, &(0x7f0000000100), 0x0, 0x4844, &(0x7f0000000700)=@file={0x1, './file0/file0/file0\x00'}, 0x6e) r9 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) fchdir(r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x80440, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) getdents(r1, &(0x7f0000000400)=""/240, 0xf0) 00:25:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r4 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 511.374439] minix_free_inode: bit 1 already cleared 00:25:28 executing program 6: r0 = socket(0x10, 0x80002, 0x0) lseek(r0, 0x0, 0x3) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="04002b0003000000151ff28a3a088e7fc6b5d0771735e30abeaf485f9f0ca2e33bf2e9dd40b3ce4cee6d5b6c83b397edbc4c14f09f8b24fbd4caeb161fd895b1b2272a9440e1466ea3878a970200ed6d6a71d92555dfc83b4098720000000000020000000000"], 0x2}, 0x1, 0x0, 0x0, 0x8000}, 0x48000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c1800005200030000000000000000001c00000008000161", @ANYRES32=0x0], 0x321}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 511.663385] IPVS: ftp: loaded support on port[0] = 21 00:25:29 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x5, 0x5, 0x9f08, 0x1000}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000030c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000003c00)={&(0x7f0000000040), 0xc, &(0x7f0000003bc0)={&(0x7f00000034c0)={0x60, r1, 0x7854e3c3fcb45e07, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 00:25:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 511.887303] minix_free_inode: bit 1 already cleared [ 511.990533] netlink: 'syz-executor6': attribute type 3 has an invalid length. 00:25:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697802", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 512.102592] netlink: 'syz-executor6': attribute type 3 has an invalid length. [ 512.132098] minix_free_inode: bit 1 already cleared 00:25:29 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0xffffffffffff, 0x1f) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3, 0x4000) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 512.198207] minix_free_inode: bit 1 already cleared 00:25:29 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400100, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$PIO_FONTX(r1, 0x545d, &(0x7f00000002c0)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc000, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000080)=""/4096) [ 512.810230] minix_free_inode: bit 1 already cleared [ 513.187058] minix_free_inode: bit 1 already cleared [ 513.312169] minix_free_inode: bit 1 already cleared 00:25:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") setrlimit(0xd, &(0x7f0000000040)={0x0, 0xfffffffffffffff8}) fcntl$notify(r0, 0x402, 0x20) 00:25:31 executing program 6: unshare(0x22000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x8, {0x2, 0x4e24, @local}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}, 0x40, 0x5, 0x7f000, 0x6, 0x8, &(0x7f0000000040)='nr0\x00', 0x3, 0x8, 0xffffffffffff0129}) 00:25:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0xffffffffffffffff, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697810", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x120, 0x0, 0x4f) splice(0xffffffffffffffff, &(0x7f0000000040), r0, &(0x7f0000000080), 0x6, 0x2) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x6}, &(0x7f0000000140)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x1}, 0x8) 00:25:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:31 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:31 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) lseek(r0, 0x800000, 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESHEX], @ANYRES64]) mkdir(&(0x7f0000000000)='./bus\x00', 0x4) r2 = creat(&(0x7f0000001f80)='./bus\x00', 0x0) ftruncate(r2, 0x28200) sendfile(r0, r1, &(0x7f0000000040)=0x2400, 0x8000fffffffe) fchmodat(r1, &(0x7f0000000700)='./bus\x00', 0x0) sendmmsg$unix(r2, &(0x7f0000001ac0), 0x0, 0x8000) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 514.398162] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:25:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000100)=""/222) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="b0e928cde34f2506327dcbb5f84de3b844943e207a17953dfdac94bd6f45a0e876e3b4b3471cc38c740f33a04143b7372041f3464177d95cc1", 0x39, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0xfffffffffffffffc, r3) r4 = socket(0xa, 0x2, 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0x8) 00:25:31 executing program 6: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x8, 0x1, 0x1, 0x7, 0x1f, 0x101, 0x100000001, 0x1f, 0x0, 0x5}) mount(&(0x7f0000000480)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='.', &(0x7f00000001c0)='loefs\x00', 0x9004, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000002e80)='./file0\x00', &(0x7f0000753000)='msdos\x00', 0x5010, &(0x7f0000000380)) chroot(&(0x7f00000003c0)='./file0\x00') umount2(&(0x7f0000000440)='./file0\x00', 0x0) 00:25:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0x134, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="20000000290021000000000000000000020000002ae3df59501459393945fa567cda4f4a52b77f609c3313f52196d083cef3d105cb0eda32227da5e0bf7e321c94a392fbfdbe981630c9d1f27ce0ecb49e62ee71614b33d8da1794b1f9dbee634876b0707df50dd83f8d581f62d3099f11e94cc9d709c95e3dc6b3a48af71c9f35f1f7f7b24cb5d4fc785a78cc1400159db358d224b470a8c88cf874d426c0b3e12615951c6be66a7f4c5838f6231780abaedf6d5032be1032bf459911f9dde338c62f4ede16e27bc79f4ff08305"], 0x20}}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) 00:25:32 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000240)={0xa, 0x4e24, 0xffff, @dev={0xfe, 0x80, [], 0x1a}}, 0x1c) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0xa000700, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x2000) write$P9_RRENAME(r3, &(0x7f0000000200)={0x7}, 0x7) [ 514.960769] netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. 00:25:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x103c40, 0x62) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000340), &(0x7f00000003c0)=0x60) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x400) write$FUSE_GETXATTR(r2, &(0x7f00000002c0)={0x18, 0x0, 0x7, {0x7}}, 0x18) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000200)={"6e6174000000060600000000000000000000001000", 0x0, 0x4, 0xd6, [], 0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/214}, &(0x7f0000000280)=0x93b6) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "73680000000000000000036000"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 00:25:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xd90}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001ec0)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x6}, 0x2) pwrite64(r0, &(0x7f0000000100)="9e600fa00cb23927d414be457c52b6f388850e7c3996e4273cd9be7c53260fabff6453a4ca050d46861da3f1717ef06167ebf7097157c695d6c73c0f920451ac9eed5eb6a289c70f9a6678f8a4a9ddae4275cb6c20193662d2ac9bca1fe868c34ab3173d86f777f77079b82077f81db317806d2477d9fdcc70e9236cbfc029e4f8e655600e34b9bcadbd760e96eb7e", 0x8f, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000001c0)={0x2, r0}) 00:25:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x0, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:32 executing program 0: r0 = timerfd_create(0x7, 0x80000) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) [ 515.346722] minix_free_inode: bit 1 already cleared 00:25:32 executing program 3: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) socket$inet6(0xa, 0x81000000000002, 0x1000) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000000)='./file2\x00', 0x6100, 0x1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0xc028660f, &(0x7f0000000040)) 00:25:32 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000080)={0x1f, 0x0, 0x401}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001480)={[{@logdev={'logdev', 0x3d, './file0'}}]}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000000)=0x6f2, 0x4) 00:25:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x800) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x7, 0x4, [0x9, 0x6, 0x6, 0x3f]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000280)={r2, 0x9}, &(0x7f00000002c0)=0x8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000040)}}, &(0x7f0000000040)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f00000001c0)) tkill(r3, 0x1000000000016) 00:25:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e6978ff", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 515.454400] minix_free_inode: bit 1 already cleared [ 515.487295] XFS (loop5): Invalid device [./file0], error=-15 [ 515.488338] minix_free_inode: bit 1 already cleared 00:25:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x102}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$KIOCSOUND(r1, 0x4b2f, 0x3) close(r0) [ 515.535963] XFS (loop5): Invalid device [./file0], error=-15 00:25:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x68, 0x29, 0x2, {0xf8, [{{0x40, 0x1, 0x7}, 0x8, 0x1f, 0x7, './file0'}, {{0x2, 0x1, 0x3}, 0x0, 0x6, 0x7, './file0'}, {{0xee, 0x2, 0x5}, 0xb4d4, 0x7, 0x7, './file0'}]}}, 0x68) mprotect(&(0x7f00001b6000/0x4000)=nil, 0x4000, 0x0) 00:25:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000000, 0x0, 0x0) 00:25:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)=0x0) r3 = getuid() r4 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000003c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = gettid() getresuid(&(0x7f0000001640)=0x0, &(0x7f0000001680), &(0x7f00000016c0)) r10 = getgid() r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000001700)='/dev/net/tun\x00', 0x4002, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001800)=0x0) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0, 0x0}, &(0x7f0000001940)=0xc) sendmsg$netlink(r1, &(0x7f0000001b00)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x10018004}, 0xc, &(0x7f0000000300), 0x0, &(0x7f0000001980)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r11]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}], 0x150, 0x4}, 0x1) r15 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r15, 0x40000000af01, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_ADDR(r15, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r16 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r16) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1000000000080, 0x0) getsockopt$inet_pktinfo(r16, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @remote}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(r16, 0x0, 0x24, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, r17}, 0xc) ioctl$TUNSETIFF(r16, 0x400454ca, &(0x7f0000000340)={'veth0\x00', 0x20002001}) ioctl$VHOST_SET_MEM_TABLE(r15, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r15, 0x4008af30, &(0x7f0000f1dff8)={0x0, r16}) ioctl$VHOST_NET_SET_BACKEND(r15, 0x4008af30, &(0x7f0000000040)={0x0, r16}) [ 515.769174] can: notifier: receive list not found for dev tap0 00:25:33 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x14000, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000740)) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000000c0)={0x7fff, 0x7, 0x44c8, 0x1, 0x2d46}) r1 = getpid() r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x10000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) writev(r0, &(0x7f00000008c0)=[{&(0x7f00000001c0)="d2fc73b2be456d69185cda5a534afcae8ed6ffb0446688e41b7463b2fbfaf5696904ae041ba88aa1aa9db464e41258f8f7f61a96543358e1dae1c4dcce907e94af21719ae603f7ed7ac078e57ff1bbc5ecde9f00c0a44d83b2fc829c2f442e2dfb99542644cf39327eec9cb6702f7d32e6eca608b9ff3731aa79c1b02426621fa03e775b3c009d85963fe185c3fac0769eccc9d709e443b4d36db4a9857620f13fc325a28591b1322682ad25bd44390ba2b2a842947d6f14408d6e771304afc1bbe9788a265a6608352400a44f560b72ead0220312133072b1bcd18758c3f814963cc07e8aa6752034949f05b74730250ccbf5", 0xf3}, {&(0x7f0000000340)="65844b17ccb45862587f25870ffb64a27c59a27dc93341dbf03a7248b44a59ab2f35eef3a8f623a42b6ef6d320fe26f9cb6a9861e460af6d2a46e2600b4c5a1aebaa03d53d7cf89ac85af11a6a53de270e6336ec5fd8fa05676748d56d69a4ba63cab12d264de5687d7a9d399e58a20600d8", 0x72}, {&(0x7f00000003c0)="3e466bbc75caf7dcb1701841d4219a7f575922e4d47d82884d9f9ab0b393b9fdd9261d6aacd35db5ccd79efdfa8680796884dfdce39966d0c98d48f62d3c79b422be38f21f1f0bbe8bbdd93186befa4349da11942130aaabd2db42140803464d1c24790fb32cdbe638cbfae41f1050eda61425a7ff07d928095521fcf2aa9309043dcd8b574392f4c21e1ea4f55ef59892424884e800b9425f57925e77fe4235c9a9426d68cee3ca40794959f80235d0c29210e8b2e7219677b0ac12cc1449fd6bf2d8e8eca3ec28b8fa6288b7e2b945ddd0f8a5d54f591408fe2aa8f7d06e0711daf87fc8bdf98cd71b10e1529f0ecebcd65350", 0xf4}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="491f27ea28cde30d0880a130642c0874384e9c088ee5f3de57f04166b2df34fb8ab58cc0cc76cb3834bc3e343dcc7579a3e3f3ce09956d9bc2b6f5aee940827f2666bda2", 0x44}, {&(0x7f0000000580)="0041f24e04d097a8864570ca4eec43b1ee7536bfee7c214d1aa513b101a96bb93de6e0ff4a411154179751da95424c39adbf0fcd489f72d3cc195e9308fb81a4a78fcf2cd71f6776a5a6f2e05f053fa77d01bdaec243ac4983551a64a3b05628857745b8008cbef3a26beaa1ec0fce8b3fd0a341bc471c2a89cc43cba0a3c001385ad066e166f424d2f2b87bc2c0423ec606cff24a9ce1013a28e8378409fed7164ee5e3873fd6fa5c2509b8718f2c43e83bbc6a3c51ffed4409883cbe8d3af51dd702feb2448bdfa4ee8fa3cb571f17c08b042c24cc9e5b0029735e4768722646d73e065d6bac95", 0xe8}], 0x6) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendto$unix(r0, &(0x7f0000000780)="09bbb9ce476f333ad68c42b85ca0bff5a1e262b8070e12f3962a6f506ccf51564c21bd689f75472cb6f41314d95cf41c517073f711c1983dafc0b410efdf6ef60de16dcd4ddb47da77b56ad647cb449c7ea2e073f6fc4707dc7a68f370a9912d676f3f903cbb7d9b16e88e6e78b1e4fed8a520e3b78582d195b69070c6df6a12e7642cad761c9f3cb5986b69152b7edc14116f8b83b823d6e7ff4b2c6b23a837ac33bb06a9483e728dc748dad75d", 0xae, 0x4, &(0x7f0000000840)=@file={0x0, './file0\x00'}, 0x6e) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x78) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r5 = getpgrp(r1) ptrace$peek(0x1, r5, &(0x7f0000000700)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f00000002c0)="66b8008000000f23d00f21f86635000000070f23f80f20e06635000004000f22e09a0090f1000f06660fede70fc719baf80c66b850d1618666efbafc0c66ed2e66dd4e4e3e0f09ea6f351401", 0x4c}], 0xaaaade3, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 00:25:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e697806", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0xfffffffffffffffc, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x100000001) ioctl$RTC_ALM_SET(r0, 0x80247009, &(0x7f0000001580)) 00:25:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000548000)=0xf8000000000000, 0xffffff78) sendto$inet6(r0, &(0x7f0000000440), 0xfffffffffffffeda, 0x0, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1c) accept$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) recvmsg(r0, &(0x7f0000000400)={&(0x7f00000002c0)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0xe, "fd56ffeeaa31e2bc321342524782"}, &(0x7f0000000140)=0x16) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e24, 0x6, @mcast2, 0x9}}, [0xc45, 0x3, 0xa1b, 0xb7, 0x3, 0x53, 0xd336, 0x80000000, 0x100000000, 0x27b7, 0x8001, 0x401, 0x3f, 0x10001, 0x10000]}, &(0x7f0000000280)=0x100) [ 515.938362] can: notifier: receive list not found for dev tap0 [ 515.973143] minix_free_inode: bit 1 already cleared 00:25:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) accept4(r0, &(0x7f0000000080)=@hci={0x1f, 0x0}, &(0x7f0000000000)=0x80, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x4e20, 0x0, 0x4e22, 0xf7b6, 0xa, 0x20, 0x20, 0x5c, r1, r2}, {0x1, 0x2d, 0x8, 0x32, 0x0, 0x2, 0x5, 0x80}, {0x1000, 0x6, 0x3, 0xfff}, 0x100000000, 0x0, 0x0, 0x0, 0x3, 0x2}, {{@in6, 0x4d3, 0x6f}, 0xa, @in=@multicast2, 0x3500, 0x7, 0x1, 0x7, 0xff, 0x2, 0x100000000}}, 0xe8) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r3 = socket(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x10001, @ipv4={[0xfeffffff], [], @loopback}, 0xffffffffffffff8a}, 0x1c) setsockopt$inet_int(r3, 0x0, 0x28, &(0x7f0000000300), 0x4) 00:25:33 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400c02, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x75, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) close(r0) 00:25:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x0) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:33 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0xfffffffffffffffe, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKBSZSET(r1, 0x8912, &(0x7f0000000140)) 00:25:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x281, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000240)={'mangle\x00', 0xdd, "c7184e10c038ac93aed65c15b5ebbaafabc827880471df423c186185daad621239590f9ff02a14e79f0caf1ce4e80ec61c20495db4b5c99c154b1f83030efea17e31dc0518f696bbe3cc15ca9577031aefbfcb35b17026240b2b169b8a4c24b2051f48a80b890bc51cef5ff77d70ac50404160cb54a373a50d0fbb7252c558b9042e50abf21dcf58989c25ab4ff548c803bf09a82112dc4479985e9828b024f7930449d9454091bf2a7fb0061c566ef2585036f2ba1a2f52fc63b15c1a9bbf123f7a0ba57aaa82b807fbcbdb5d1a0d78d092ce8b10999c54fac92f6d9b"}, &(0x7f00000000c0)=0x101) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) ppoll(&(0x7f0000000080)=[{r2}], 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x8) ioctl$sock_netdev_private(r3, 0x89f5, &(0x7f0000000180)="9ea6bafec4b5ce1e3744") dup2(r0, r0) 00:25:33 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f00000004c0)="72f35301a28f8e", 0x7, 0xfffffffffffffffb) keyctl$read(0xb, r2, &(0x7f00000014c0)=""/4096, 0x1000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100]}) ioctl$KVM_NMI(r3, 0xae9a) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:25:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\a', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:33 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000000), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x8002, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000001c0)={0x400, 0x100, 0x3, 0x7, 0xfffffffffffffa5a, 0xfffffffffffffff7, 0x3, 0x0, 0x5, 0xfffffffffffffff8}) mq_timedsend(r0, &(0x7f0000000040)="6f90d308a04e18536205a2b8b5fae19537ffbabffcf6e878463e930293c43c08f09b9eb9eb6342f8872f7759a9edad46881a2b9ebc4c88e16f45bcd46970ecc4ed72e572566ecbe6b59847f383e40aa77b73db6706fc9f0de884d799ab63993a7d997389b7275b304c2eac1ee05cef6115d6f351b67914dbb7026b39d8c9f227e2e003817d668f6d29a5d35b4ed935e1cba9878d0e6d54acb8e381ae8d2afcc1995c960a4c04272d02994a0c9e8480c604767966db6f0b4834e99566dac4b1636da7df2a2405cefda666001abc609d75ac669fcd5697a72ec136dec46d976a8e262b110dbf4c9c31eb", 0xe9, 0x40, &(0x7f0000000140)={0x77359400}) [ 516.397502] minix_free_inode: bit 1 already cleared 00:25:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") semctl$IPC_SET(0x0, 0x0, 0x12, &(0x7f0000000480)) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50810000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="f0000000100000042dbd7000fedbdf256563622d626c6f77666973682d61736d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000400000000000000000000080001000600000008000100200000001d"], 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 00:25:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_ROPEN(r3, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x21, 0x0, 0x1}, 0x20}}, 0x18) kcmp(r1, r2, 0x7, r0, r0) write(r0, &(0x7f0000000040)="2400000021002553075f01650272fc02800000200010fd0033ff000c080017003c4dbd93", 0x24) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\\wlan0[%)userlo\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x7}, 0x4) ioctl$LOOP_CLR_FD(r4, 0x4c01) 00:25:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e69788c", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)) 00:25:33 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0xc018620b, 0x730000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8000, 0x400001) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 00:25:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(r0, 0x89ec, &(0x7f0000000180)="318c9795d58c62d46b3a42d2aacdd3b9c2ad197c705e47c762311960bd9312e27a8e498257a06c37ddaa84dd85384777e420b0df5efccb0bbae1bd9636e28c3a0cdf103179b29ee00b7603f0e83fdbf2f26ddef3d73ccd65ad14c2d7da3292fe95a7bec64e792e16678ff582001dfcb1d67c08cfe7bf640efa2ca200e6e84fe6c75b9bfff213bce093e36b5771ec7cd42c908d271c9b4b431698a95a6cab2a3b9f06bd19fed25549851aecdaf87f9d4c") r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000140)={0x56aa, 0x11, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x6012, r2, 0x0) 00:25:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) r3 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 00:25:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f00000002c0), 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000002c0)={0x1, 0x0, 0x2080, {0xf000, 0x100000, 0x2}, [], "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", "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"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB]) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4800, 0x0) ioctl$TIOCCONS(r3, 0x541d) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f00000000c0)="9a09000201baf80c66b8d488538b66efbafc0cb8e34bef0f01d10f2306baf80c66b8b2acf68566efbafc0cb82e9aef66b8010000000f01c18fca78107906935c00000fc72e2e4b26de61850f0010", 0x4e}], 0x1, 0x40, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:25:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x9, 0x4000000000000800, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x101201) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000001180)=""/4096}, 0x18) [ 516.842180] ion_mmap: failure mapping buffer to userspace [ 516.871054] binder: 22461:22466 ioctl c018620b 730000 returned -14 [ 516.922541] ion_mmap: failure mapping buffer to userspace 00:25:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r3 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)="6d696e6978ff", &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) [ 517.039441] WARNING: CPU: 1 PID: 22484 at arch/x86/kvm/vmx.c:8247 enter_vmx_operation+0x391/0x470 [ 517.048808] Kernel panic - not syncing: panic_on_warn set ... [ 517.048808] [ 517.056216] CPU: 1 PID: 22484 Comm: syz-executor0 Not tainted 4.18.0-next-20180824+ #47 [ 517.064357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.073717] Call Trace: [ 517.076343] dump_stack+0x1c9/0x2b4 [ 517.079991] ? dump_stack_print_info.cold.2+0x52/0x52 [ 517.085199] panic+0x238/0x4e7 [ 517.088401] ? add_taint.cold.5+0x16/0x16 [ 517.092561] ? __warn.cold.8+0x148/0x1ba [ 517.096642] ? enter_vmx_operation+0x391/0x470 [ 517.101238] __warn.cold.8+0x163/0x1ba [ 517.105146] ? enter_vmx_operation+0x391/0x470 [ 517.109753] report_bug+0x252/0x2d0 [ 517.113401] do_error_trap+0x1fc/0x4d0 [ 517.117312] ? math_error+0x3e0/0x3e0 [ 517.121127] ? mark_held_locks+0xc9/0x160 [ 517.125292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 517.130154] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 517.135212] ? kmem_cache_alloc_trace+0x275/0x730 [ 517.140098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 517.144966] do_invalid_op+0x1b/0x20 [ 517.148700] invalid_op+0x14/0x20 [ 517.152171] RIP: 0010:enter_vmx_operation+0x391/0x470 [ 517.157382] Code: 00 4c 89 ef bb f4 ff ff ff e8 7b ec ff ff e9 f2 fe ff ff e8 31 ea 5f 00 48 8b 4d d0 48 85 c9 0f 84 08 ff ff ff e8 1f ea 5f 00 <0f> 0b e9 0e fe ff ff e8 a3 2b 9f 00 e9 c1 fe ff ff e8 b9 2b 9f 00 [ 517.176889] RSP: 0018:ffff88018fa9ef48 EFLAGS: 00010216 [ 517.182360] RAX: 0000000000040000 RBX: ffff8801ca9b8b80 RCX: ffffc9000c879000 [ 517.189641] RDX: 0000000000000383 RSI: ffffffff811ce3b1 RDI: ffff8801ca9be360 [ 517.196921] RBP: ffff88018fa9ef80 R08: ffff8801add16380 R09: ffffed003b6246de [ 517.204201] R10: ffffed003b6246de R11: ffff8801db1236f3 R12: ffff8801ca9be6e8 [ 517.211480] R13: ffff8801ca9be6f8 R14: ffff8801ca9be6e0 R15: ffff8801ca9be2e8 [ 517.218782] ? enter_vmx_operation+0x391/0x470 [ 517.223392] ? enter_vmx_operation+0x391/0x470 [ 517.227996] vmx_set_nested_state+0x4d6/0xea0 [ 517.232517] ? handle_vmlaunch+0x20/0x20 [ 517.236607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 517.242168] ? _copy_from_user+0xdf/0x150 [ 517.246346] kvm_arch_vcpu_ioctl+0x790/0x3ac0 [ 517.250861] ? __lock_acquire+0x7fc/0x5020 [ 517.255120] ? __update_load_avg_se+0xb80/0xb80 [ 517.259820] ? kvm_arch_vcpu_put+0x420/0x420 [ 517.264256] ? mark_held_locks+0x160/0x160 [ 517.268538] ? attach_entity_load_avg+0x860/0x860 [ 517.273413] ? update_load_avg+0x389/0x27d0 [ 517.277744] ? mark_held_locks+0x160/0x160 [ 517.282030] ? attach_entity_load_avg+0x860/0x860 [ 517.286922] ? __lock_acquire+0x7fc/0x5020 [ 517.291188] ? rb_erase+0x3550/0x3550 [ 517.295003] ? mark_held_locks+0x160/0x160 [ 517.299262] ? print_usage_bug+0xc0/0xc0 [ 517.303343] ? lock_acquire+0x1e4/0x4f0 [ 517.307340] ? kvm_vcpu_ioctl+0x1ea/0x1280 [ 517.311594] ? lock_release+0x9f0/0x9f0 [ 517.315595] ? check_same_owner+0x340/0x340 [ 517.319942] ? rcu_note_context_switch+0x680/0x680 [ 517.324894] ? kasan_check_write+0x14/0x20 [ 517.329142] ? __mutex_lock+0x6d0/0x1700 [ 517.333217] ? kvm_vcpu_ioctl+0x1ea/0x1280 [ 517.337462] ? mark_held_locks+0x160/0x160 [ 517.341724] ? mutex_trylock+0x2b0/0x2b0 [ 517.345801] ? __lock_is_held+0xb5/0x140 [ 517.349881] ? __account_cfs_rq_runtime+0x770/0x770 [ 517.354918] ? __lock_acquire+0x7fc/0x5020 [ 517.358402] init_special_inode: bogus i_mode (0) for inode loop4:1 [ 517.359169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.359245] ? __perf_event_task_sched_out+0x2f0/0x1a60 [ 517.359272] ? perf_event_update_userpage+0xd30/0xd30 [ 517.359287] ? graph_lock+0x170/0x170 [ 517.359307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.359330] ? __perf_event_task_sched_in+0x24f/0xbb0 [ 517.396229] ? find_held_lock+0x36/0x1c0 [ 517.400322] ? _raw_spin_unlock_irq+0x27/0x70 [ 517.404850] kvm_vcpu_ioctl+0x286/0x1280 [ 517.408930] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 517.414816] ? find_held_lock+0x36/0x1c0 [ 517.418909] ? lock_downgrade+0x8f0/0x8f0 [ 517.423083] ? __switch_to_asm+0x40/0x70 [ 517.427165] ? kasan_check_read+0x11/0x20 [ 517.431324] ? rcu_is_watching+0x8c/0x150 [ 517.435490] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 517.440210] ? __fget+0x4d5/0x740 [ 517.443694] ? ksys_dup3+0x690/0x690 [ 517.447429] ? kasan_check_write+0x14/0x20 [ 517.451692] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 517.457419] do_vfs_ioctl+0x1de/0x1720 [ 517.461330] ? ioctl_preallocate+0x300/0x300 [ 517.465766] ? __fget_light+0x2f7/0x440 [ 517.468607] init_special_inode: bogus i_mode (0) for inode loop1:1 [ 517.469755] ? __schedule+0x1df0/0x1df0 [ 517.469774] ? fget_raw+0x20/0x20 [ 517.469792] ? trace_hardirqs_off+0xb8/0x2b0 [ 517.469809] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 517.469849] ? do_syscall_64+0x6be/0x820 [ 517.469864] ? trace_hardirqs_on+0x2c0/0x2c0 [ 517.469879] ? trace_hardirqs_on+0xbd/0x2c0 [ 517.469894] ? do_syscall_64+0x9a/0x820 [ 517.469910] ? do_syscall_64+0x9a/0x820 [ 517.469925] ? lockdep_hardirqs_on+0x421/0x5c0 [ 517.469945] ? security_file_ioctl+0x94/0xc0 [ 517.469964] ksys_ioctl+0xa9/0xd0 [ 517.469984] __x64_sys_ioctl+0x73/0xb0 [ 517.470001] do_syscall_64+0x1b9/0x820 [ 517.470017] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 517.470035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 517.470052] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 517.470080] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 517.470096] ? recalc_sigpending_tsk+0x180/0x180 [ 517.470116] ? kasan_check_write+0x14/0x20 [ 517.564117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 517.569000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.574199] RIP: 0033:0x457089 [ 517.577422] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.596330] RSP: 002b:00007f3e6b199c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 517.604032] RAX: ffffffffffffffda RBX: 00007f3e6b19a6d4 RCX: 0000000000457089 [ 517.611289] RDX: 00000000200002c0 RSI: 000000004080aebf RDI: 0000000000000005 [ 517.618551] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 517.625811] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 517.633088] R13: 00000000004cf070 R14: 00000000004c56c3 R15: 0000000000000002 [ 517.640912] Dumping ftrace buffer: [ 517.644606] (ftrace buffer empty) [ 517.648315] Kernel Offset: disabled [ 517.651928] Rebooting in 86400 seconds..