46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 308.524806][T11509] MINIX-fs: bad superblock or unable to read bitmaps [ 308.575776][ T6785] minix_free_inode: bit 1 already cleared 04:21:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 308.671795][T11516] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 308.685100][T11518] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:22 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 308.737011][T11527] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 308.750481][T11527] attempt to access beyond end of device [ 308.756375][T11527] loop0: rw=2049, want=6434, limit=52 [ 308.764705][T11527] buffer_io_error: 2 callbacks suppressed [ 308.764715][T11527] Buffer I/O error on dev loop0, logical block 3216, lost async page write [ 308.780623][T11527] attempt to access beyond end of device 04:21:23 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100fc03, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 308.786336][T11527] loop0: rw=2049, want=6436, limit=52 [ 308.792013][T11527] Buffer I/O error on dev loop0, logical block 3217, lost async page write [ 308.820841][T11526] MINIX-fs: bad superblock or unable to read bitmaps 04:21:23 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 308.885355][ T6915] minix_free_inode: bit 1 already cleared 04:21:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 308.955331][ T6785] minix_free_inode: bit 1 already cleared 04:21:23 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 309.092953][T11540] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 309.107463][T11542] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 309.190905][T11544] MINIX-fs: bad superblock or unable to read bitmaps [ 309.223503][T11555] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:23 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 309.250669][T11553] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:23 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 309.301100][ T6915] minix_free_inode: bit 1 already cleared [ 309.327785][T11553] minix_free_inode: bit 1 already cleared 04:21:23 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100fd03, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 309.487267][T11567] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:23 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 309.544930][T11572] MINIX-fs: bad superblock or unable to read bitmaps [ 309.620621][T11574] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:23 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 309.682358][ T6915] minix_free_inode: bit 1 already cleared 04:21:23 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 309.849326][T11579] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 309.890688][T11588] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 309.900706][T11579] minix_free_inode: bit 1 already cleared [ 309.939738][T11589] MINIX-fs: bad superblock or unable to read bitmaps 04:21:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:24 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100fe03, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 310.130795][T11594] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 310.203928][T11602] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:24 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 310.290060][T11602] minix_free_inode: bit 1 already cleared [ 310.327147][T11614] MINIX-fs: bad superblock or unable to read bitmaps 04:21:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 310.369077][ T6915] minix_free_inode: bit 1 already cleared [ 310.381557][T11608] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) 04:21:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:24 executing program 0: open(0x0, 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 310.585872][T11623] MINIX-fs: bad superblock or unable to read bitmaps [ 310.593566][T11612] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 310.612819][T11631] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 310.695595][T11633] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:24 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100fe08, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:24 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 310.749216][T11633] minix_free_inode: bit 1 already cleared [ 310.787920][ T6915] minix_free_inode: bit 1 already cleared 04:21:25 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000000080)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) fstatfs(r1, &(0x7f0000000200)=""/4096) r2 = socket$kcm(0x2b, 0x7, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x6) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000000)={0x9d6b, 0x401, 0x80000000, 0x8, 0x3, 0x7f}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 310.949946][T11640] MINIX-fs: bad superblock or unable to read bitmaps [ 310.991054][T11644] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:25 executing program 0: open(0x0, 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) 04:21:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:25 executing program 4: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x8, 0x2, 0x0, 0x0, 0x2, 0x9040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x20000000, 0x0, 0x0, 0xb75}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) socket$phonet_pipe(0x23, 0x5, 0x2) socket(0x1e, 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) socket(0x11, 0x800000003, 0x0) close(0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x4) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x211}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000100)) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x581000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x4000, 0x0) 04:21:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 311.133069][T11656] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 311.155106][T11662] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:25 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 311.227338][T11668] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 311.236680][T11668] minix_free_inode: bit 1 already cleared 04:21:25 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100ff00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 311.278252][ T6915] minix_free_inode: bit 1 already cleared 04:21:25 executing program 0: open(0x0, 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe0, 0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000180)) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @bt={0x6, 0x7ff, 0xcb, 0x7, 0x2, 0xacb, 0x8, 0x2}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000200)='westwood\x00', 0x9) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TLS_TX(r7, 0x6, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "9acafd726e9a3f17", "ed9333456af4e3a06d0ab203bbc2c2bc", "18a91d09", "36b218902668f50d"}, 0x28) write$cgroup_subtree(r1, 0x0, 0x4ea00) 04:21:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 311.496678][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 311.496689][ T28] audit: type=1800 audit(1592194885.649:398): pid=11687 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16230 res=0 04:21:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 311.542856][T11690] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 311.543457][ T28] audit: type=1800 audit(1592194885.669:399): pid=11690 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16233 res=0 04:21:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 311.666037][T11691] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYRESOCT=r6, @ANYRES64=r5, @ANYBLOB="78fd213881224fff2f5c1c2a33da90595e3650a5bd4a3edeebe5425d197c691a8df41b2db253ae6d47b7c72004d570f8fe15278264ce99d14da14147ef6c66e8b62bdb673f923d7835979732fdda4ea5078f", @ANYRES16, @ANYRESOCT=r0], 0x32600) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$cgroup_subtree(r3, 0x0, 0x4ea00) [ 311.738735][T11687] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:25 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100ff03, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:25 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 311.790775][T11691] minix_free_inode: bit 1 already cleared 04:21:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 311.825093][ T28] audit: type=1800 audit(1592194885.910:400): pid=11687 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16230 res=0 [ 311.859169][ T6915] minix_free_inode: bit 1 already cleared 04:21:26 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 311.926849][ T28] audit: type=1800 audit(1592194886.080:401): pid=11715 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16243 res=0 04:21:26 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 312.105894][ T28] audit: type=1800 audit(1592194886.260:402): pid=11726 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16231 res=0 04:21:26 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 312.179942][T11715] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 312.268944][T11726] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 312.301662][ T28] audit: type=1800 audit(1592194886.460:403): pid=11715 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16243 res=0 [ 312.317197][T11732] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 312.330855][T11732] minix_free_inode: bit 1 already cleared 04:21:26 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:26 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:26 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 312.412667][ T6915] minix_free_inode: bit 1 already cleared 04:21:26 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100ff08, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) [ 312.600640][ T28] audit: type=1800 audit(1592194886.760:404): pid=11748 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16243 res=0 04:21:26 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 312.665430][ T28] audit: type=1800 audit(1592194886.790:405): pid=11749 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16244 res=0 [ 312.711819][T11747] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 312.739988][T11748] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 312.765322][T11749] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 312.823135][T11747] minix_free_inode: bit 1 already cleared [ 312.871749][ T28] audit: type=1800 audit(1592194887.030:406): pid=11748 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16243 res=0 04:21:27 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 312.961846][ T6915] minix_free_inode: bit 1 already cleared 04:21:27 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:27 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100ff0f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 313.243324][ T28] audit: type=1800 audit(1592194887.400:407): pid=11781 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16243 res=0 [ 313.267104][T11781] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 313.422349][T11780] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 313.444660][T11783] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:27 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100ff7f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 313.510495][T11793] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 313.536487][T11780] minix_free_inode: bit 1 already cleared 04:21:27 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:27 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 313.630322][ T6915] minix_free_inode: bit 1 already cleared 04:21:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 313.843561][T11805] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 313.858256][T11804] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 04:21:28 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:28 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x100fff0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 314.071609][T11817] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 314.105151][ T6785] minix_free_inode: bit 1 already cleared 04:21:28 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 314.222606][ T6915] minix_free_inode: bit 1 already cleared 04:21:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x8000, 0x0) 04:21:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 314.351208][T11831] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 314.406462][T11834] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:28 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 314.571483][ T6785] minix_free_inode: bit 1 already cleared [ 314.590122][T11846] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x8000, 0x0) [ 314.624163][T11841] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:28 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1040000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:28 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x8000, 0x0) [ 314.764697][ T6915] minix_free_inode: bit 1 already cleared [ 314.904108][T11860] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 314.908444][T11866] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:29 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 314.947761][T11874] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 314.979995][ T6915] minix_free_inode: bit 1 already cleared 04:21:29 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 315.080751][ T6785] minix_free_inode: bit 1 already cleared [ 315.094376][T11880] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x400}], 0x8000, 0x0) 04:21:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 315.260874][T11887] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:29 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x400}], 0x8000, 0x0) [ 315.464601][ T6915] minix_free_inode: bit 1 already cleared 04:21:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 315.521818][T11905] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:29 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 315.567323][T11906] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 315.581631][T11905] attempt to access beyond end of device [ 315.608894][T11905] loop0: rw=2049, want=6434, limit=52 [ 315.619928][T11905] Buffer I/O error on dev loop0, logical block 3216, lost async page write [ 315.629744][T11905] attempt to access beyond end of device [ 315.635669][T11905] loop0: rw=2049, want=6436, limit=52 [ 315.641416][T11905] Buffer I/O error on dev loop0, logical block 3217, lost async page write 04:21:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x400}], 0x8000, 0x0) [ 315.709750][T11909] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 315.726514][T11918] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:29 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:30 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 315.807549][ T6915] minix_free_inode: bit 1 already cleared [ 315.814553][ T6785] minix_free_inode: bit 1 already cleared 04:21:30 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:30 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x2040000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:30 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 316.134130][T11931] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 316.184377][T11932] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}], 0x8000, 0x0) 04:21:30 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:30 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:30 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 316.297401][ T6785] minix_free_inode: bit 1 already cleared [ 316.324875][ T6915] minix_free_inode: bit 1 already cleared [ 316.377172][T11947] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:30 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x0, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 316.531960][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 316.531972][ T28] audit: type=1800 audit(1592194890.691:430): pid=11945 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16231 res=0 [ 316.614278][ T28] audit: type=1800 audit(1592194890.731:431): pid=11955 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16271 res=0 04:21:30 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 316.674092][ T28] audit: type=1800 audit(1592194890.751:432): pid=11958 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16254 res=0 [ 316.720910][T11955] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 316.778806][T11958] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}], 0x8000, 0x0) 04:21:31 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x0, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 316.918506][ T28] audit: type=1800 audit(1592194891.081:433): pid=11973 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16250 res=0 [ 316.955447][T11974] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:31 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:31 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 317.029795][ T6915] minix_free_inode: bit 1 already cleared [ 317.036036][ T6785] minix_free_inode: bit 1 already cleared 04:21:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}], 0x8000, 0x0) 04:21:31 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x0, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x242040, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) r4 = openat$null(0xffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000240)={0x1, 0x0, &(0x7f00000000c0)=[0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r4, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000040)=[0xc339, 0x43dd], 0x2, 0x800, r5}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000060601080006860000000000000000007997ef78d4c1adcf29d5a08b9d4f5810b496d9e9eb51003bf486c565f99d5cbc9ec698e3dc393cae"], 0x14}}, 0x0) ftruncate(0xffffffffffffffff, 0x5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f0000000140)=[0x9, 0x80000000, 0x10000, 0x6353, 0xb22, 0xffff, 0x7, 0xff, 0x8], 0x9, 0x80000, r5, r6}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x6, &(0x7f0000000400)={r8, @in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x39}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdefe]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000440)={r8, 0x6}, &(0x7f0000000480)=0x8) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 317.230354][ T28] audit: type=1800 audit(1592194891.391:434): pid=11973 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16250 res=0 [ 317.265866][T11974] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 317.313004][ T28] audit: type=1800 audit(1592194891.461:435): pid=11994 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16272 res=0 04:21:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}], 0x8000, 0x0) 04:21:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:31 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:31 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x3040000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 317.386622][ T28] audit: type=1800 audit(1592194891.531:436): pid=12001 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16280 res=0 [ 317.432289][T11994] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:31 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}], 0x8000, 0x0) [ 317.510412][T12008] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:31 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 317.578931][ T28] audit: type=1800 audit(1592194891.731:437): pid=12017 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15902 res=0 [ 317.605039][T12017] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 317.616340][ T6915] minix_free_inode: bit 1 already cleared 04:21:31 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x14, r4, 0x1}, 0xffffffffffffff67}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x64, r4, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, [], 0x1}}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x9}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x17b5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x7f}]}, 0x64}, 0x1, 0x0, 0x0, 0xc010}, 0x40000) [ 317.698030][ T6785] minix_free_inode: bit 1 already cleared 04:21:31 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 317.731035][ T28] audit: type=1800 audit(1592194891.891:438): pid=12017 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15902 res=0 [ 317.798140][T12029] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x107700) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) fcntl$addseals(r3, 0x409, 0x0) write$cgroup_subtree(r1, 0x0, 0x4ea00) 04:21:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}], 0x8000, 0x0) [ 317.883945][ T28] audit: type=1800 audit(1592194892.041:439): pid=12039 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16284 res=0 04:21:32 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:32 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') socket(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xddf5) [ 317.940023][T12039] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 318.019827][T12042] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 318.051480][T12042] attempt to access beyond end of device [ 318.070668][T12042] loop0: rw=2049, want=6434, limit=52 [ 318.089841][T12042] Buffer I/O error on dev loop0, logical block 3216, lost async page write [ 318.115780][T12042] attempt to access beyond end of device 04:21:32 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 318.144492][T12042] loop0: rw=2049, want=6436, limit=52 [ 318.179817][T12042] Buffer I/O error on dev loop0, logical block 3217, lost async page write 04:21:32 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400000006060108000000000000000000000000e0649d371c63dc4d54d02f889ebf3bfeec48b059fd0c69afe901877741e220a49ce937fc7c3cd82f82cd75043f5b493b1e90322a71cb242b5279e513b06ca7c8e7415aa9dd07dcb91f4941bbb2f0e71acbbcfd4217aa89e54e1cd12dcdc780da5e4a964a061d161fd49d669f9aa7668459d61a5f30a60124cfc9a0f7"], 0x14}}, 0x0) splice(r6, 0x0, r4, 0x0, 0x4ffdd, 0x0) write$UHID_INPUT2(r3, &(0x7f0000000000)={0xc, {0x3f, "fe1d8336b5722708eb0724a7ca15c29d02c468b20a9dd7dc1c52d12024969b4b3573580991cf4a3f13e2a87f8e1b11366a42a557c79db72f57480218e321f0"}}, 0x45) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x400, {{0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0xbd1}}, {{0xa, 0x4e22, 0x3, @mcast1, 0x4}}}, 0x108) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 318.197222][ T6915] minix_free_inode: bit 1 already cleared 04:21:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}], 0x8000, 0x0) 04:21:32 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:32 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') socket(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xddf5) [ 318.300202][ T6785] minix_free_inode: bit 1 already cleared [ 318.347071][T12060] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 318.379794][T12063] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 318.438905][T12075] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 318.449637][T12076] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 318.467164][T12075] attempt to access beyond end of device [ 318.473058][T12075] loop0: rw=2049, want=6434, limit=52 [ 318.479160][T12075] Buffer I/O error on dev loop0, logical block 3216, lost async page write 04:21:32 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 318.488254][T12075] attempt to access beyond end of device [ 318.494375][T12075] loop0: rw=2049, want=6436, limit=52 [ 318.500733][T12075] Buffer I/O error on dev loop0, logical block 3217, lost async page write 04:21:32 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') socket(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xddf5) [ 318.540385][ T6785] minix_free_inode: bit 1 already cleared 04:21:32 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:32 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x4040000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 318.617016][ T6915] minix_free_inode: bit 1 already cleared 04:21:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}], 0x8000, 0x0) 04:21:32 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r2 = socket(0x10, 0x3, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xddf5) 04:21:32 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0xd001, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}, @IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x40}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r4, @ANYBLOB="01e300000000000000000300000004000180"], 0x18}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x200000000000011, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r6, &(0x7f0000000240)={0x11, 0x0, r8}, 0x14) getsockname$packet(r6, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14}]}]}]}, @IFLA_IFALIASn={0x4}]}, 0x44}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x58, r4, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r9}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20048004}, 0x20044000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 318.763992][T12097] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 318.786999][T12097] attempt to access beyond end of device [ 318.793460][T12097] loop0: rw=2049, want=6434, limit=52 [ 318.799090][T12097] Buffer I/O error on dev loop0, logical block 3216, lost async page write [ 318.807964][T12097] attempt to access beyond end of device [ 318.813748][T12097] loop0: rw=2049, want=6436, limit=52 [ 318.819418][T12097] Buffer I/O error on dev loop0, logical block 3217, lost async page write 04:21:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}], 0x8000, 0x0) 04:21:33 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 318.855954][T12096] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 318.871054][T12098] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 318.893274][T12111] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 318.896799][ T6785] minix_free_inode: bit 1 already cleared 04:21:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r2 = socket(0x10, 0x3, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xddf5) 04:21:33 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 318.935087][T12107] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 318.998263][ T6915] minix_free_inode: bit 1 already cleared 04:21:33 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000080)={0x4, &(0x7f0000000200)=""/215, &(0x7f0000000000)=[{0x7, 0xcb, 0x7, &(0x7f0000000300)=""/203}, {0x1, 0xcb, 0x1, &(0x7f0000000400)=""/203}, {0x3f, 0xe9, 0x6, &(0x7f0000000500)=""/233}, {0x7000000, 0xde, 0x1, &(0x7f0000000600)=""/222}]}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r2 = socket(0x10, 0x3, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xddf5) [ 319.075863][T12115] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:33 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}], 0x8000, 0x0) [ 319.252330][T12128] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 319.261770][T12129] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x0) 04:21:33 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:33 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 319.362937][T12140] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.393946][ T6785] minix_free_inode: bit 1 already cleared [ 319.412684][ T6915] minix_free_inode: bit 1 already cleared 04:21:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x0) 04:21:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x0) 04:21:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}], 0x8000, 0x0) [ 319.602570][T12148] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.657427][T12157] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 319.665938][T12161] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:33 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:33 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 319.780844][T12157] attempt to access beyond end of device [ 319.796398][T12157] loop0: rw=2049, want=6434, limit=52 [ 319.802068][ T6915] minix_free_inode: bit 1 already cleared [ 319.812475][T12157] Buffer I/O error on dev loop0, logical block 3216, lost async page write [ 319.822580][T12157] attempt to access beyond end of device [ 319.829351][T12157] loop0: rw=2049, want=6436, limit=52 [ 319.835108][T12157] Buffer I/O error on dev loop0, logical block 3217, lost async page write [ 319.873160][ T6785] minix_free_inode: bit 1 already cleared 04:21:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2640, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x1, 0x6}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r3, 0x0, 0x4ea00) 04:21:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}], 0x8000, 0x0) 04:21:34 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}], 0x8000, 0x0) [ 320.048183][T12175] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:34 executing program 2: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 320.156481][T12183] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 320.166620][T12185] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:34 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}], 0x8000, 0x0) 04:21:34 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 320.219761][ T6915] minix_free_inode: bit 1 already cleared 04:21:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001ff) write$cgroup_subtree(r0, 0x0, 0x4ea00) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) sendto$inet(r2, &(0x7f0000000000)="4974311c636912ccf612923b7ca489ccefa8e20d052b770bd24e8abc01f8c04907d8032bce4adf21d2f55fb4d2cce3f28c1138b9954573e59718611bc82ab4b0690853e77dc5e4b0adb385ba22a0cd877a", 0x51, 0x4040904, 0x0, 0x0) [ 320.271286][ T6785] minix_free_inode: bit 1 already cleared [ 320.322685][T12185] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 320.475704][T12212] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 320.487296][T12205] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 320.514666][T12216] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:34 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}], 0x8000, 0x0) 04:21:34 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}], 0x8000, 0x0) 04:21:34 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:34 executing program 2: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 320.692190][ T6915] minix_free_inode: bit 1 already cleared [ 320.748691][ T6785] minix_free_inode: bit 1 already cleared [ 320.754791][ T7002] minix_free_inode: bit 1 already cleared 04:21:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xd001, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}, @IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x40}}, 0x0) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000100)={0xfffffffffffffffd, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x0, 0x70bd2d, 0x25dfdbfe, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x40088c1) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0xd001, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}, @IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x40}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f00000004c0)={{0x2, 0x0, @identifier="420b7f095c0ca388407721ced1b318a0"}}) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x68, 0x8, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="370efe5a", @ANYRES16=r5, @ANYBLOB="000227bd7000ffdbdf2505000000050001000100000014000200fc0000000000000000000000000000012700070073797374656d5f753a6f626a6563745f723a7061737377645f657865635f743a7330000014000300fe88000000000000000000000000000108000400ac14141d14000200ff01000000000000000000000000000114000200fe800000000000000000000000000036"], 0x9c}, 0x1, 0x0, 0x0, 0x40805}, 0x40800) write$cgroup_subtree(r0, 0x0, 0x4ea00) ioctl$TCSBRK(r0, 0x5409, 0x9) [ 320.870172][T12232] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}], 0x8000, 0x0) [ 321.005539][T12250] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 321.023439][T12252] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 321.033847][T12250] attempt to access beyond end of device [ 321.076884][T12250] loop0: rw=2049, want=6434, limit=52 [ 321.083458][T12256] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 321.113042][T12250] Buffer I/O error on dev loop0, logical block 3216, lost async page write 04:21:35 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x7020000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}], 0x8000, 0x0) [ 321.121871][T12250] attempt to access beyond end of device [ 321.137453][T12250] loop0: rw=2049, want=6436, limit=52 [ 321.148452][T12250] Buffer I/O error on dev loop0, logical block 3217, lost async page write 04:21:35 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 321.170484][T12256] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:21:35 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 321.223203][ T6915] minix_free_inode: bit 1 already cleared [ 321.269688][T12256] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 321.279436][ T6785] minix_free_inode: bit 1 already cleared 04:21:35 executing program 2: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 321.357560][T12272] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 321.370265][T12271] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) r1 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r1, 0xc050565d, &(0x7f0000000240)={0x0, 0x1, 0x0, "aae6ce8e100e5aabc2719c089784ed80a32c985e14fcfadc35bac115cd6dcecd"}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}], 0x8000, 0x0) [ 321.495835][T12280] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:35 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:35 executing program 2: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1002300, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 321.566270][T12291] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 321.588412][ T6915] minix_free_inode: bit 1 already cleared 04:21:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000080)) r3 = socket$kcm(0x2b, 0x1, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x80) ioctl$TIOCL_GETKMSGREDIRECT(r4, 0x541c, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:35 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:35 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 321.768483][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 321.768496][ T28] audit: type=1800 audit(1592194895.932:472): pid=12313 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16268 res=0 04:21:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:36 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x5, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) [ 321.810087][ T28] audit: type=1800 audit(1592194895.932:473): pid=12312 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16271 res=0 [ 321.866226][ T28] audit: type=1800 audit(1592194895.932:474): pid=12314 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16273 res=0 [ 321.897205][T12313] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 321.906749][T12312] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 321.923501][ T28] audit: type=1800 audit(1592194896.082:475): pid=12326 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16297 res=0 04:21:36 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14}]}]}]}, @IFLA_IFALIASn={0x4}]}, 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000008c80)={'team0\x00', r6}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) ioctl$sock_SIOCDELRT(r8, 0x890c, &(0x7f0000008cc0)={0x0, @vsock={0x28, 0x0, 0xfffffffe, @local}, @can={0x1d, 0x0}, @sco, 0xff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x804, 0x1, 0xffff}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000008e80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2002004}, 0xc, &(0x7f0000008e40)={&(0x7f0000008d40)={0xc4, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKMODES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0xc4}}, 0x41001) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r10 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:36 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)=')%)\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x40) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 322.042521][T12326] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 322.051801][ T28] audit: type=1800 audit(1592194896.212:476): pid=12336 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16313 res=0 [ 322.085191][T12328] MINIX-fs: bad superblock or unable to read bitmaps 04:21:36 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 322.139927][ T28] audit: type=1800 audit(1592194896.302:477): pid=12326 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16297 res=0 [ 322.174330][ T6915] minix_free_inode: bit 1 already cleared [ 322.244583][T12348] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 322.308170][ T28] audit: type=1800 audit(1592194896.472:478): pid=12351 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16271 res=0 [ 322.328138][T12341] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 322.345182][T12351] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:36 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 322.441261][ T28] audit: type=1800 audit(1592194896.592:479): pid=12357 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16273 res=0 04:21:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xc7e) r5 = openat$cgroup_ro(r4, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x53, 0x6, 0x9f, 0x2, @buffer={0x0, 0x31, &(0x7f0000000180)=""/49}, &(0x7f0000000200)="57976fc436aab9cd45f767ec0003f51b78e711f42f62674c5213ba6f32a79c66e541deeec4d6465bfea18086e830e5ddad4cfe7d2fc6922ca5f78ad85ab39fcc6389aa56461811638d311df71f05085ab417ec5f585689dce595a501fe591c680dccd421e9b1995c59a3aeb0e77b51c143ba2d57a16b7526cfa85cb9be868aef4ab12928e45ed74b3f16dc9a1857e6f898493acdbbe65b58ebef95e41be8f5", &(0x7f00000002c0)=""/59, 0x5, 0x2, 0x1, &(0x7f0000000300)}) ptrace$cont(0x7, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x7, 0x0, 0xf0, 0x0, 0x9, 0x20, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb44e, 0x2, @perf_config_ext={0x9, 0xffffffffffffff1a}, 0x443c1, 0x8000, 0x7, 0x5, 0x2, 0x6, 0xc0}, 0x0, 0x1, r4, 0x9) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r5, 0x40405515, &(0x7f0000000080)={0x3, 0x6, 0x10000, 0x401, 'syz1\x00', 0x21}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) dup(r0) write$cgroup_subtree(r0, 0x0, 0x0) 04:21:36 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:36 executing program 2 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:36 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:36 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:36 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 322.578592][ T6915] minix_free_inode: bit 1 already cleared [ 322.619088][ T28] audit: type=1800 audit(1592194896.782:480): pid=12363 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16265 res=0 [ 322.643601][T12371] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:36 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 322.676761][T12372] FAULT_INJECTION: forcing a failure. [ 322.676761][T12372] name failslab, interval 1, probability 0, space 0, times 0 [ 322.686485][ T28] audit: type=1800 audit(1592194896.802:481): pid=12371 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16297 res=0 [ 322.721486][T12372] CPU: 1 PID: 12372 Comm: syz-executor.2 Not tainted 5.7.0-syzkaller #0 [ 322.729831][T12372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.739884][T12372] Call Trace: [ 322.743181][T12372] dump_stack+0x188/0x20d [ 322.747519][T12372] should_fail.cold+0x5/0xa [ 322.752028][T12372] ? lock_downgrade+0x840/0x840 [ 322.756887][T12372] ? fault_create_debugfs_attr+0x140/0x140 [ 322.762709][T12372] should_failslab+0x5/0xf [ 322.767130][T12372] __kmalloc+0x2d9/0x7a0 [ 322.771377][T12372] ? __x64_sys_memfd_create+0x136/0x490 [ 322.776956][T12372] ? wait_for_completion+0x270/0x270 [ 322.782247][T12372] ? __this_cpu_preempt_check+0x28/0x190 [ 322.787885][T12372] ? __sb_end_write+0x101/0x1d0 [ 322.792737][T12372] ? strnlen_user+0x1f5/0x2e0 [ 322.797464][T12372] __x64_sys_memfd_create+0x136/0x490 [ 322.802840][T12372] ? memfd_fcntl+0x1330/0x1330 [ 322.807607][T12372] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 322.813592][T12372] ? do_syscall_64+0x21/0x7d0 [ 322.818402][T12372] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 322.824376][T12372] do_syscall_64+0xf6/0x7d0 [ 322.828871][T12372] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 322.834739][T12372] RIP: 0033:0x45ca69 [ 322.838628][T12372] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.858207][T12372] RSP: 002b:00007f3470ed5a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 322.866604][T12372] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 04:21:37 executing program 2 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 322.874563][T12372] RDX: 0000000020000018 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 322.882508][T12372] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 322.890497][T12372] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000006 [ 322.898456][T12372] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f3470ed66d4 04:21:37 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 323.006455][T12363] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 323.016376][T12379] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 323.034040][T12391] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:37 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 323.116796][ T6915] minix_free_inode: bit 1 already cleared [ 323.127596][T12396] FAULT_INJECTION: forcing a failure. [ 323.127596][T12396] name failslab, interval 1, probability 0, space 0, times 0 [ 323.140415][T12396] CPU: 1 PID: 12396 Comm: syz-executor.2 Not tainted 5.7.0-syzkaller #0 [ 323.148737][T12396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.158786][T12396] Call Trace: [ 323.162081][T12396] dump_stack+0x188/0x20d 04:21:37 executing program 5 (fault-call:19 fault-nth:0): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 323.166418][T12396] should_fail.cold+0x5/0xa [ 323.170927][T12396] ? lock_downgrade+0x840/0x840 [ 323.175782][T12396] ? fault_create_debugfs_attr+0x140/0x140 [ 323.181682][T12396] ? shmem_destroy_inode+0x70/0x70 [ 323.186791][T12396] should_failslab+0x5/0xf [ 323.191210][T12396] kmem_cache_alloc+0x29b/0x740 [ 323.196064][T12396] ? find_held_lock+0x2d/0x110 [ 323.200900][T12396] ? __alloc_fd+0x46d/0x600 [ 323.205406][T12396] ? shmem_destroy_inode+0x70/0x70 [ 323.210521][T12396] shmem_alloc_inode+0x18/0x40 [ 323.215284][T12396] ? shmem_destroy_inode+0x70/0x70 [ 323.220393][T12396] alloc_inode+0x61/0x1e0 [ 323.224730][T12396] new_inode_pseudo+0x14/0xe0 [ 323.229408][T12396] new_inode+0x1b/0x40 [ 323.233486][T12396] shmem_get_inode+0x84/0x7e0 [ 323.238157][T12396] __shmem_file_setup.part.0+0x7a/0x2b0 [ 323.243679][T12396] shmem_file_setup+0x61/0x90 [ 323.248383][T12396] __x64_sys_memfd_create+0x2bb/0x490 [ 323.253727][T12396] ? memfd_fcntl+0x1330/0x1330 [ 323.258504][T12396] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 323.264458][T12396] ? do_syscall_64+0x21/0x7d0 [ 323.269132][T12396] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 323.275145][T12396] do_syscall_64+0xf6/0x7d0 [ 323.279625][T12396] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 323.285497][T12396] RIP: 0033:0x45ca69 [ 323.289376][T12396] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.308977][T12396] RSP: 002b:00007f3470ed5a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:21:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000060601080000e2280100ae25c40f0000"], 0x14}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000440)=ANY=[@ANYRESHEX=r6, @ANYRESDEC, @ANYRESHEX=r5, @ANYRESDEC=r3, @ANYBLOB="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", @ANYRESDEC=r4, @ANYRESDEC=r2, @ANYBLOB="0ccab40884eb0fa1ab1e12da14ea774c25a231e048d79db6e50223ad06f8fa3a97b890c028f6ab4812c9d4fdfd861470add0714c538e869fe53d4e81b04bb385db9993401fb4ceb548c7bc9ff3da815cad94aca56073e93a9e54382b5810d69ddf4f1578b8fd"], 0x4240a2a0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000000)={0x7, 0x0, 'client1\x00', 0x6, "ead6e906bef09710", "930e3be8ac7d836ad7d66629a3691dc8e2560529bb160b2802a2687532f12f99", 0x6, 0x72}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x2b, 0x4, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x54) write$cgroup_subtree(r7, 0x0, 0x4ea00) [ 323.317368][T12396] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 323.325320][T12396] RDX: 0000000020000018 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 323.333274][T12396] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 323.341245][T12396] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000006 [ 323.349192][T12396] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f3470ed66d4 [ 323.358426][ T7346] minix_free_inode: bit 1 already cleared 04:21:37 executing program 2 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:37 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:37 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 323.657231][T12409] FAULT_INJECTION: forcing a failure. [ 323.657231][T12409] name failslab, interval 1, probability 0, space 0, times 0 [ 323.719683][T12409] CPU: 0 PID: 12409 Comm: syz-executor.2 Not tainted 5.7.0-syzkaller #0 [ 323.728036][T12409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.738088][T12409] Call Trace: [ 323.741383][T12409] dump_stack+0x188/0x20d [ 323.745727][T12409] should_fail.cold+0x5/0xa [ 323.750240][T12409] ? lock_downgrade+0x840/0x840 [ 323.755096][T12409] ? fault_create_debugfs_attr+0x140/0x140 [ 323.760911][T12409] should_failslab+0x5/0xf [ 323.765319][T12409] kmem_cache_alloc+0x29b/0x740 [ 323.770161][T12409] ? timestamp_truncate+0x20f/0x2f0 [ 323.775573][T12409] __d_alloc+0x2a/0x920 [ 323.779812][T12409] ? ktime_get_coarse_real_ts64+0x19b/0x280 [ 323.785704][T12409] d_alloc_pseudo+0x19/0x70 [ 323.790196][T12409] alloc_file_pseudo+0xc6/0x250 [ 323.795022][T12409] ? lockdep_init_map_waits+0x26a/0x890 [ 323.800555][T12409] ? alloc_file+0x590/0x590 [ 323.805091][T12409] ? lockdep_annotate_inode_mutex_key+0x3c/0x70 [ 323.811319][T12409] ? shmem_get_inode+0x487/0x7e0 [ 323.816264][T12409] __shmem_file_setup.part.0+0x102/0x2b0 [ 323.821912][T12409] shmem_file_setup+0x61/0x90 [ 323.826587][T12409] __x64_sys_memfd_create+0x2bb/0x490 [ 323.831953][T12409] ? memfd_fcntl+0x1330/0x1330 [ 323.836706][T12409] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 323.842678][T12409] ? do_syscall_64+0x21/0x7d0 [ 323.847336][T12409] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 323.853306][T12409] do_syscall_64+0xf6/0x7d0 [ 323.857804][T12409] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 323.863697][T12409] RIP: 0033:0x45ca69 [ 323.867574][T12409] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.887160][T12409] RSP: 002b:00007f3470ed5a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 323.895562][T12409] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 323.903524][T12409] RDX: 0000000020000018 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 323.911476][T12409] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 04:21:38 executing program 2 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 323.919439][T12409] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000006 [ 323.927403][T12409] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f3470ed66d4 04:21:38 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 323.979549][T12423] FAULT_INJECTION: forcing a failure. [ 323.979549][T12423] name failslab, interval 1, probability 0, space 0, times 0 [ 324.000761][T12423] CPU: 0 PID: 12423 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 324.009174][T12423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.019222][T12423] Call Trace: [ 324.022498][T12423] dump_stack+0x188/0x20d [ 324.026828][T12423] should_fail.cold+0x5/0xa [ 324.031322][T12423] ? lock_downgrade+0x840/0x840 [ 324.036262][T12423] ? fault_create_debugfs_attr+0x140/0x140 [ 324.042063][T12423] should_failslab+0x5/0xf [ 324.046472][T12423] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 324.051962][T12423] ? aa_file_perm+0x5be/0x14d0 [ 324.056729][T12423] ? __lock_acquire+0xc6c/0x48a0 [ 324.061663][T12423] alloc_pipe_info+0x10a/0x4f0 [ 324.066533][T12423] splice_direct_to_actor+0x777/0x980 [ 324.071887][T12423] ? debug_smp_processor_id+0x2f/0x185 [ 324.077372][T12423] ? do_splice_from+0x110/0x110 [ 324.082201][T12423] ? do_splice_to+0x170/0x170 [ 324.086877][T12423] do_splice_direct+0x1b4/0x280 [ 324.091719][T12423] ? splice_direct_to_actor+0x980/0x980 [ 324.097251][T12423] do_sendfile+0x555/0xc50 [ 324.101698][T12423] ? do_compat_pwritev64+0x1b0/0x1b0 [ 324.106963][T12423] ? wait_for_completion+0x270/0x270 [ 324.112234][T12423] ? __sb_end_write+0x101/0x1d0 [ 324.117072][T12423] ? vfs_write+0x161/0x5d0 [ 324.121578][T12423] __x64_sys_sendfile64+0x1cc/0x210 [ 324.126760][T12423] ? __ia32_sys_sendfile+0x220/0x220 [ 324.132035][T12423] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 324.138061][T12423] ? do_syscall_64+0x21/0x7d0 [ 324.142727][T12423] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 324.148688][T12423] do_syscall_64+0xf6/0x7d0 [ 324.153171][T12423] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 324.159149][T12423] RIP: 0033:0x45ca69 [ 324.163034][T12423] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.182752][T12423] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 324.191144][T12423] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 324.199094][T12423] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 324.207042][T12423] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 324.215129][T12423] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 324.223092][T12423] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 04:21:38 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 324.263990][T12414] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 324.294017][T12418] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 324.340477][ T6915] minix_free_inode: bit 1 already cleared [ 324.352597][T12431] FAULT_INJECTION: forcing a failure. [ 324.352597][T12431] name failslab, interval 1, probability 0, space 0, times 0 [ 324.385420][T12431] CPU: 0 PID: 12431 Comm: syz-executor.2 Not tainted 5.7.0-syzkaller #0 [ 324.393780][T12431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.403829][T12431] Call Trace: [ 324.407117][T12431] dump_stack+0x188/0x20d [ 324.411441][T12431] should_fail.cold+0x5/0xa [ 324.415935][T12431] ? lock_downgrade+0x840/0x840 [ 324.420787][T12431] ? fault_create_debugfs_attr+0x140/0x140 [ 324.426605][T12431] should_failslab+0x5/0xf [ 324.431010][T12431] kmem_cache_alloc+0x29b/0x740 04:21:38 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "62ee145d2a8e7486", "fe4b82e04cafc9555b08cb9eb67643af78f486fc8a719fe639d898c78c356ffb", "3784f601", "82d339915a975a7c"}, 0x38) [ 324.435854][T12431] ? lock_downgrade+0x840/0x840 [ 324.440713][T12431] __alloc_file+0x21/0x350 [ 324.445136][T12431] alloc_empty_file+0x6d/0x170 [ 324.449900][T12431] alloc_file+0x5e/0x590 [ 324.454145][T12431] alloc_file_pseudo+0x165/0x250 [ 324.459085][T12431] ? alloc_file+0x590/0x590 [ 324.463590][T12431] ? shmem_get_inode+0x487/0x7e0 [ 324.468533][T12431] __shmem_file_setup.part.0+0x102/0x2b0 [ 324.474171][T12431] shmem_file_setup+0x61/0x90 [ 324.478852][T12431] __x64_sys_memfd_create+0x2bb/0x490 [ 324.484215][T12431] ? memfd_fcntl+0x1330/0x1330 [ 324.488972][T12431] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 324.494953][T12431] ? do_syscall_64+0x21/0x7d0 [ 324.499632][T12431] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 324.505603][T12431] do_syscall_64+0xf6/0x7d0 [ 324.510092][T12431] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 324.515969][T12431] RIP: 0033:0x45ca69 [ 324.519860][T12431] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.539460][T12431] RSP: 002b:00007f3470ed5a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 324.547871][T12431] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 324.555840][T12431] RDX: 0000000020000018 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 324.563811][T12431] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 324.571776][T12431] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000005 [ 324.579747][T12431] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f3470ed66d4 04:21:38 executing program 5 (fault-call:19 fault-nth:1): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:38 executing program 2 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:38 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:38 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 324.783504][T12446] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:39 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="600000006404000429bd7000fddbdf25a37b142bd0fac5c88f41300f372dd1374607f8ff1847f1b465dc2abdfc06201d16c30fce13fd578bdeff643ada775ac2f1361f05501fed94d8e5764c68285493eec56c113dcb70630b2182066200000027d110e1a1516c"], 0x60}, 0x1, 0x0, 0x0, 0x24000805}, 0x40000) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x9, @raw_data="d5cc2610942dd26b8fa9587cc888ee19fc8581a6a4f0f0c5656ddafe5be3e8c5c3b9f1420d9583fcd025b02f5b760760d28c7a2b2bd4f355e3894391458b5e585f73d437d6c17ebb3412c3f44a17d3429711983d4f730187cdafeb7f228a1994f5577e55ef233bfc069b764507bc655a221578f31828813bd6f0f20b14977a09127b70bea878d0a2ce6a9e482d924c0454d7f47c7309eb035f59cb26d08c716085370440b8436c8c41d077b74a63e829a67f33d54da3e9104485a7a7eb1513e320486cfa14e7f677"}) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:39 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 324.826820][T12452] FAULT_INJECTION: forcing a failure. [ 324.826820][T12452] name failslab, interval 1, probability 0, space 0, times 0 [ 324.871376][ T6915] minix_free_inode: bit 1 already cleared [ 324.886048][T12453] FAULT_INJECTION: forcing a failure. [ 324.886048][T12453] name failslab, interval 1, probability 0, space 0, times 0 [ 324.905936][T12453] CPU: 0 PID: 12453 Comm: syz-executor.2 Not tainted 5.7.0-syzkaller #0 [ 324.914278][T12453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.924328][T12453] Call Trace: [ 324.927627][T12453] dump_stack+0x188/0x20d [ 324.931971][T12453] should_fail.cold+0x5/0xa [ 324.936486][T12453] ? lock_downgrade+0x840/0x840 [ 324.941346][T12453] ? fault_create_debugfs_attr+0x140/0x140 [ 324.947162][T12453] should_failslab+0x5/0xf [ 324.951587][T12453] kmem_cache_alloc+0x29b/0x740 [ 324.956440][T12453] ? kmem_cache_alloc+0x358/0x740 [ 324.961554][T12453] security_file_alloc+0x34/0x160 [ 324.966580][T12453] __alloc_file+0xd8/0x350 [ 324.971067][T12453] alloc_empty_file+0x6d/0x170 [ 324.975812][T12453] alloc_file+0x5e/0x590 [ 324.980050][T12453] alloc_file_pseudo+0x165/0x250 [ 324.984973][T12453] ? alloc_file+0x590/0x590 [ 324.989491][T12453] ? shmem_get_inode+0x487/0x7e0 [ 324.994417][T12453] __shmem_file_setup.part.0+0x102/0x2b0 [ 325.000060][T12453] shmem_file_setup+0x61/0x90 [ 325.004743][T12453] __x64_sys_memfd_create+0x2bb/0x490 [ 325.010114][T12453] ? memfd_fcntl+0x1330/0x1330 [ 325.014869][T12453] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 325.020839][T12453] ? do_syscall_64+0x21/0x7d0 [ 325.025508][T12453] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 325.031481][T12453] do_syscall_64+0xf6/0x7d0 [ 325.035969][T12453] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 325.041849][T12453] RIP: 0033:0x45ca69 [ 325.045734][T12453] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.065327][T12453] RSP: 002b:00007f3470ed5a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 325.073729][T12453] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 325.081796][T12453] RDX: 0000000020000018 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 325.089751][T12453] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 325.097710][T12453] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000005 [ 325.105693][T12453] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f3470ed66d4 [ 325.113686][T12452] CPU: 1 PID: 12452 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 325.122016][T12452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.132069][T12452] Call Trace: [ 325.135363][T12452] dump_stack+0x188/0x20d [ 325.139705][T12452] should_fail.cold+0x5/0xa [ 325.144214][T12452] ? lock_downgrade+0x840/0x840 [ 325.149080][T12452] ? fault_create_debugfs_attr+0x140/0x140 [ 325.154895][T12452] should_failslab+0x5/0xf [ 325.159310][T12452] __kmalloc+0x2d9/0x7a0 [ 325.163549][T12452] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 325.164576][T12454] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 325.169082][T12452] ? alloc_pipe_info+0x1e0/0x4f0 [ 325.169099][T12452] ? aa_file_perm+0x5be/0x14d0 [ 325.169118][T12452] ? __lock_acquire+0xc6c/0x48a0 [ 325.169135][T12452] alloc_pipe_info+0x1e0/0x4f0 [ 325.169154][T12452] splice_direct_to_actor+0x777/0x980 [ 325.169185][T12452] ? debug_smp_processor_id+0x2f/0x185 [ 325.208313][T12452] ? do_splice_from+0x110/0x110 [ 325.213144][T12452] ? do_splice_to+0x170/0x170 [ 325.217801][T12452] do_splice_direct+0x1b4/0x280 [ 325.222629][T12452] ? splice_direct_to_actor+0x980/0x980 [ 325.228213][T12452] do_sendfile+0x555/0xc50 [ 325.232738][T12452] ? do_compat_pwritev64+0x1b0/0x1b0 [ 325.238004][T12452] ? wait_for_completion+0x270/0x270 [ 325.243329][T12452] ? __sb_end_write+0x101/0x1d0 [ 325.248154][T12452] ? vfs_write+0x161/0x5d0 [ 325.252557][T12452] __x64_sys_sendfile64+0x1cc/0x210 [ 325.257734][T12452] ? __ia32_sys_sendfile+0x220/0x220 [ 325.262992][T12452] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 325.268950][T12452] ? do_syscall_64+0x21/0x7d0 [ 325.273605][T12452] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 325.279562][T12452] do_syscall_64+0xf6/0x7d0 [ 325.284048][T12452] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 325.289918][T12452] RIP: 0033:0x45ca69 [ 325.293794][T12452] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.313415][T12452] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 04:21:39 executing program 2 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 325.321861][T12452] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 325.329813][T12452] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 325.337763][T12452] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 325.345713][T12452] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 325.353666][T12452] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 325.423244][T12468] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 325.424523][T12457] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 325.459299][T12475] FAULT_INJECTION: forcing a failure. [ 325.459299][T12475] name failslab, interval 1, probability 0, space 0, times 0 [ 325.483430][T12475] CPU: 0 PID: 12475 Comm: syz-executor.2 Not tainted 5.7.0-syzkaller #0 [ 325.491781][T12475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.501833][T12475] Call Trace: [ 325.505131][T12475] dump_stack+0x188/0x20d [ 325.509479][T12475] should_fail.cold+0x5/0xa [ 325.513990][T12475] ? fault_create_debugfs_attr+0x140/0x140 [ 325.519810][T12475] should_failslab+0x5/0xf [ 325.524234][T12475] __kmalloc+0x2d9/0x7a0 04:21:39 executing program 5 (fault-call:19 fault-nth:2): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 325.528485][T12475] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 325.534465][T12475] ? tomoyo_realpath_from_path+0xc2/0x620 [ 325.540187][T12475] ? lock_release+0x800/0x800 [ 325.544864][T12475] ? print_usage_bug+0x240/0x240 [ 325.549804][T12475] tomoyo_realpath_from_path+0xc2/0x620 [ 325.555393][T12475] ? tomoyo_profile+0x42/0x50 [ 325.560065][T12475] tomoyo_path_perm+0x214/0x400 [ 325.564901][T12475] ? tomoyo_path_perm+0x1ba/0x400 [ 325.570005][T12475] ? tomoyo_check_open_permission+0x370/0x370 [ 325.576064][T12475] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 325.582039][T12475] ? __fget_files+0x30d/0x500 [ 325.586729][T12475] ? rcu_read_lock_any_held+0xcd/0xf0 [ 325.592077][T12475] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 325.597344][T12475] security_path_truncate+0xeb/0x150 [ 325.602613][T12475] do_sys_ftruncate+0x3fc/0x570 [ 325.607457][T12475] do_syscall_64+0xf6/0x7d0 [ 325.611940][T12475] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 325.617817][T12475] RIP: 0033:0x45ca37 [ 325.621702][T12475] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 3c e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.641291][T12475] RSP: 002b:00007f3470ed5a68 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 325.649695][T12475] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca37 [ 325.657645][T12475] RDX: 0000000020000018 RSI: 0000000000000800 RDI: 0000000000000007 [ 325.665638][T12475] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 325.673703][T12475] R10: 0000000000000400 R11: 0000000000000213 R12: 0000000000000006 04:21:39 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 325.681805][T12475] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f3470ed66d4 [ 325.712887][T12475] ERROR: Out of memory at tomoyo_realpath_from_path. 04:21:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) sendto(r3, &(0x7f0000001200)="de27c36528cbc57a531c7686bc072c1c1d3233917fc3b75a0dd97a5f64a597b1fc621d3e50c41656af0567b837c03bd92dde3111411231034860e094e12e9a5fcf3afadf57047e3cbc3ef6ef4886ef40583dce7e96c2c1d102e8066c8105b32659572dafe96c3fb8bef609e1d6c2fe472e391d9a1cb810b2ef5498eb07944f5001405326bc03b203b5f36273f68600f95c835252256bd15618f6b04750486c8292349308e73ecc6fa06810fc133d40e085f0d27b6cc671f4665614b3da9f47c5f1e1400d85bc95", 0xc7, 0x80, &(0x7f0000001300)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x80) write$cgroup_subtree(r1, 0x0, 0x4ea00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0xe1f, 0x1000, &(0x7f0000000200)="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", 0x0, 0x0, 0xaf, 0x81, 0x5, 0x3, 0x4, 'syz1\x00'}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:21:39 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 325.762224][ T6915] minix_free_inode: bit 1 already cleared 04:21:40 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xc000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 325.855235][T12475] MINIX-fs: bad superblock or unable to read bitmaps [ 325.886219][T12484] FAULT_INJECTION: forcing a failure. [ 325.886219][T12484] name failslab, interval 1, probability 0, space 0, times 0 [ 325.899318][T12484] CPU: 0 PID: 12484 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 325.907641][T12484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.917687][T12484] Call Trace: [ 325.920969][T12484] dump_stack+0x188/0x20d [ 325.925287][T12484] should_fail.cold+0x5/0xa [ 325.929771][T12484] ? lock_downgrade+0x840/0x840 [ 325.934599][T12484] ? fault_create_debugfs_attr+0x140/0x140 [ 325.940388][T12484] should_failslab+0x5/0xf [ 325.944784][T12484] kmem_cache_alloc_node_trace+0x27c/0x790 [ 325.950583][T12484] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 325.956564][T12484] __kmalloc_node+0x38/0x60 [ 325.961051][T12484] kvmalloc_node+0x61/0xf0 [ 325.965460][T12484] iov_iter_get_pages_alloc+0x841/0x1420 [ 325.971098][T12484] ? aa_file_perm+0x594/0x14d0 [ 325.975842][T12484] ? iov_iter_for_each_range+0x750/0x750 [ 325.981462][T12484] ? debug_smp_processor_id+0x2f/0x185 [ 325.986900][T12484] ? lock_downgrade+0x840/0x840 [ 325.991744][T12484] default_file_splice_read.isra.0+0x1d5/0xa20 [ 325.997883][T12484] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 326.003929][T12484] ? iter_file_splice_write+0xb10/0xb10 [ 326.009453][T12484] ? aa_path_link+0x300/0x300 [ 326.014123][T12484] ? aa_file_perm+0x594/0x14d0 [ 326.018873][T12484] ? debug_smp_processor_id+0x2f/0x185 [ 326.024311][T12484] ? lock_downgrade+0x840/0x840 [ 326.029146][T12484] ? find_held_lock+0x2d/0x110 [ 326.033886][T12484] ? fsnotify+0x7df/0xb50 [ 326.038194][T12484] ? fsnotify_parent+0xbf/0x2d0 [ 326.043143][T12484] ? fsnotify_first_mark+0x200/0x200 [ 326.048418][T12484] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 326.054452][T12484] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 326.060245][T12484] ? security_file_permission+0x8c/0x470 [ 326.065874][T12484] do_splice_to+0x137/0x170 [ 326.070362][T12484] splice_direct_to_actor+0x307/0x980 [ 326.075715][T12484] ? do_splice_from+0x110/0x110 [ 326.080545][T12484] ? do_splice_to+0x170/0x170 [ 326.085208][T12484] do_splice_direct+0x1b4/0x280 [ 326.090035][T12484] ? splice_direct_to_actor+0x980/0x980 [ 326.095567][T12484] do_sendfile+0x555/0xc50 [ 326.099986][T12484] ? do_compat_pwritev64+0x1b0/0x1b0 [ 326.105253][T12484] ? wait_for_completion+0x270/0x270 [ 326.110515][T12484] ? __sb_end_write+0x101/0x1d0 [ 326.115340][T12484] ? vfs_write+0x161/0x5d0 [ 326.119748][T12484] __x64_sys_sendfile64+0x1cc/0x210 [ 326.124942][T12484] ? __ia32_sys_sendfile+0x220/0x220 [ 326.130210][T12484] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 326.136167][T12484] ? do_syscall_64+0x21/0x7d0 [ 326.140821][T12484] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 326.146780][T12484] do_syscall_64+0xf6/0x7d0 [ 326.151261][T12484] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 326.157145][T12484] RIP: 0033:0x45ca69 [ 326.161017][T12484] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.180602][T12484] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 326.188988][T12484] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 326.196934][T12484] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 326.204891][T12484] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 326.212852][T12484] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 326.220810][T12484] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 326.315557][T12485] MINIX-fs: bad superblock or unable to read bitmaps 04:21:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:40 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 326.508576][T12495] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:40 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:40 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 326.657782][ T6915] minix_free_inode: bit 1 already cleared [ 326.687125][T12505] MINIX-fs: bad superblock or unable to read bitmaps [ 326.694971][T12504] MINIX-fs: bad superblock or unable to read bitmaps 04:21:40 executing program 5 (fault-call:19 fault-nth:3): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 326.702207][T12511] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) clone3(&(0x7f0000000300)={0x24000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)=0x0, {0x5}, &(0x7f0000000200)=""/135, 0x87, &(0x7f0000000140)=""/70, &(0x7f00000002c0)=[0x0, 0x0, 0xffffffffffffffff, r2], 0x4, {r1}}, 0x58) write$FUSE_LK(r1, &(0x7f0000000380)={0x28, 0x0, 0x4, {{0x10001, 0x2ab268b6, 0x2, r3}}}, 0x28) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000000)=0x1) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x6, &(0x7f0000000400)={r7, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x100) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000003c0)={r7}, 0x8) [ 326.846993][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 326.847005][ T28] audit: type=1800 audit(1592194901.013:502): pid=12511 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16332 res=0 04:21:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:41 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 326.982032][ T28] audit: type=1800 audit(1592194901.133:503): pid=12521 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15922 res=0 04:21:41 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:41 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 327.084196][T12525] FAULT_INJECTION: forcing a failure. [ 327.084196][T12525] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 327.114234][T12525] CPU: 0 PID: 12525 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 327.122591][T12525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 04:21:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0xe, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x252141) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040)={0xf082, 0xe6f4, 0x1, 0x7}, 0x8) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x6, &(0x7f0000000400)={r6, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000100)={r6, @in={{0x2, 0x4e20, @multicast1}}, 0x3, 0xff, 0x4, 0x4, 0x8, 0x9, 0x91}, &(0x7f0000000080)=0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 327.132648][T12525] Call Trace: [ 327.135951][T12525] dump_stack+0x188/0x20d [ 327.140290][T12525] should_fail.cold+0x5/0xa [ 327.144798][T12525] ? do_splice_direct+0x1b4/0x280 [ 327.149831][T12525] ? fault_create_debugfs_attr+0x140/0x140 [ 327.155641][T12525] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 327.159690][ T28] audit: type=1800 audit(1592194901.323:504): pid=12531 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15874 res=0 [ 327.161713][T12525] __alloc_pages_nodemask+0x17a/0x810 [ 327.161728][T12525] ? debug_smp_processor_id+0x2f/0x185 [ 327.161748][T12525] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 327.191642][T12531] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 327.198074][T12525] ? __kmalloc_node+0x38/0x60 [ 327.198096][T12525] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 327.198119][T12525] alloc_pages_current+0xff/0x200 [ 327.198135][T12525] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 327.198152][T12525] push_pipe+0x2af/0x690 [ 327.198176][T12525] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 327.198195][T12525] ? aa_file_perm+0x594/0x14d0 [ 327.198211][T12525] ? iov_iter_for_each_range+0x750/0x750 [ 327.198223][T12525] ? debug_smp_processor_id+0x2f/0x185 [ 327.198236][T12525] ? lock_downgrade+0x840/0x840 [ 327.198261][T12525] default_file_splice_read.isra.0+0x1d5/0xa20 [ 327.198281][T12525] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 327.198296][T12525] ? iter_file_splice_write+0xb10/0xb10 [ 327.198308][T12525] ? aa_path_link+0x300/0x300 [ 327.198319][T12525] ? aa_file_perm+0x594/0x14d0 [ 327.198333][T12525] ? debug_smp_processor_id+0x2f/0x185 [ 327.198346][T12525] ? lock_downgrade+0x840/0x840 [ 327.198364][T12525] ? find_held_lock+0x2d/0x110 [ 327.198377][T12525] ? fsnotify+0x7df/0xb50 [ 327.198390][T12525] ? fsnotify_parent+0xbf/0x2d0 [ 327.198408][T12525] ? fsnotify_first_mark+0x200/0x200 [ 327.198427][T12525] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 327.198441][T12525] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 327.198462][T12525] ? security_file_permission+0x8c/0x470 [ 327.198484][T12525] do_splice_to+0x137/0x170 [ 327.337691][T12525] splice_direct_to_actor+0x307/0x980 [ 327.343057][T12525] ? do_splice_from+0x110/0x110 [ 327.347910][T12525] ? do_splice_to+0x170/0x170 [ 327.352580][T12525] do_splice_direct+0x1b4/0x280 [ 327.357431][T12525] ? splice_direct_to_actor+0x980/0x980 [ 327.362960][T12525] do_sendfile+0x555/0xc50 [ 327.367373][T12525] ? do_compat_pwritev64+0x1b0/0x1b0 [ 327.372648][T12525] ? wait_for_completion+0x270/0x270 [ 327.377908][T12525] ? __sb_end_write+0x101/0x1d0 [ 327.382737][T12525] ? vfs_write+0x161/0x5d0 [ 327.387148][T12525] __x64_sys_sendfile64+0x1cc/0x210 [ 327.392346][T12525] ? __ia32_sys_sendfile+0x220/0x220 [ 327.397618][T12525] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 327.403603][T12525] ? do_syscall_64+0x21/0x7d0 [ 327.408278][T12525] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 327.414248][T12525] do_syscall_64+0xf6/0x7d0 [ 327.418735][T12525] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 327.424602][T12525] RIP: 0033:0x45ca69 [ 327.428484][T12525] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.448081][T12525] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 327.456482][T12525] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 327.464450][T12525] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 327.472405][T12525] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 327.480365][T12525] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 327.488321][T12525] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 327.579055][ T28] audit: type=1800 audit(1592194901.743:505): pid=12531 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15874 res=0 [ 327.598628][T12527] MINIX-fs: bad superblock or unable to read bitmaps [ 327.609196][T12538] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 327.626783][T12539] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 327.648804][ T28] audit: type=1800 audit(1592194901.743:506): pid=12539 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16321 res=0 04:21:41 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 327.706465][ T28] audit: type=1800 audit(1592194901.803:507): pid=12543 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16325 res=0 04:21:42 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 327.804960][T12543] MINIX-fs: bad superblock or unable to read bitmaps 04:21:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:42 executing program 5 (fault-call:19 fault-nth:4): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 327.854226][ T6915] minix_free_inode: bit 1 already cleared [ 327.859727][ T28] audit: type=1800 audit(1592194902.023:508): pid=12552 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15889 res=0 04:21:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {0x0, 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 327.972924][T12554] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 328.013286][T12558] MINIX-fs: bad superblock or unable to read bitmaps [ 328.051246][ T28] audit: type=1800 audit(1592194902.213:509): pid=12552 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15889 res=0 04:21:42 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x14000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 328.106179][ T28] audit: type=1800 audit(1592194902.273:510): pid=12568 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16345 res=0 [ 328.113336][T12565] FAULT_INJECTION: forcing a failure. [ 328.113336][T12565] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 328.170525][T12568] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 328.180646][T12566] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 328.201302][ T28] audit: type=1800 audit(1592194902.313:511): pid=12566 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16346 res=0 [ 328.223804][T12565] CPU: 0 PID: 12565 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 328.232142][T12565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.242192][T12565] Call Trace: [ 328.245489][T12565] dump_stack+0x188/0x20d [ 328.249830][T12565] should_fail.cold+0x5/0xa [ 328.254344][T12565] ? fault_create_debugfs_attr+0x140/0x140 [ 328.260167][T12565] __alloc_pages_nodemask+0x17a/0x810 [ 328.265541][T12565] ? debug_smp_processor_id+0x2f/0x185 [ 328.271008][T12565] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 328.277774][T12565] ? __kmalloc_node+0x38/0x60 [ 328.282457][T12565] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 328.288275][T12565] alloc_pages_current+0xff/0x200 [ 328.293304][T12565] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 328.299291][T12565] push_pipe+0x2af/0x690 [ 328.303547][T12565] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 328.309187][T12565] ? aa_file_perm+0x594/0x14d0 [ 328.313944][T12565] ? iov_iter_for_each_range+0x750/0x750 [ 328.319555][T12565] ? debug_smp_processor_id+0x2f/0x185 [ 328.325004][T12565] ? lock_downgrade+0x840/0x840 [ 328.329852][T12565] default_file_splice_read.isra.0+0x1d5/0xa20 [ 328.335989][T12565] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 328.342039][T12565] ? iter_file_splice_write+0xb10/0xb10 [ 328.347571][T12565] ? aa_path_link+0x300/0x300 [ 328.352229][T12565] ? aa_file_perm+0x594/0x14d0 [ 328.357035][T12565] ? debug_smp_processor_id+0x2f/0x185 [ 328.362506][T12565] ? lock_downgrade+0x840/0x840 [ 328.367337][T12565] ? find_held_lock+0x2d/0x110 [ 328.372078][T12565] ? fsnotify+0x7df/0xb50 [ 328.376384][T12565] ? fsnotify_parent+0xbf/0x2d0 [ 328.381223][T12565] ? fsnotify_first_mark+0x200/0x200 [ 328.386488][T12565] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 328.392463][T12565] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 328.398404][T12565] ? security_file_permission+0x8c/0x470 [ 328.404043][T12565] do_splice_to+0x137/0x170 [ 328.408550][T12565] splice_direct_to_actor+0x307/0x980 [ 328.413930][T12565] ? do_splice_from+0x110/0x110 [ 328.418783][T12565] ? do_splice_to+0x170/0x170 04:21:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000000)={0x0, 0x0, {0x400, 0xf07, 0x4001, 0x0, 0x0, 0x4, 0x2, 0x6}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) io_submit(0x0, 0x0, &(0x7f00000009c0)) [ 328.423478][T12565] do_splice_direct+0x1b4/0x280 [ 328.428332][T12565] ? splice_direct_to_actor+0x980/0x980 [ 328.433888][T12565] do_sendfile+0x555/0xc50 [ 328.438306][T12565] ? do_compat_pwritev64+0x1b0/0x1b0 [ 328.443584][T12565] ? wait_for_completion+0x270/0x270 [ 328.448958][T12565] ? __sb_end_write+0x101/0x1d0 [ 328.453790][T12565] ? vfs_write+0x161/0x5d0 [ 328.458303][T12565] __x64_sys_sendfile64+0x1cc/0x210 [ 328.463501][T12565] ? __ia32_sys_sendfile+0x220/0x220 [ 328.468774][T12565] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 328.474737][T12565] ? do_syscall_64+0x21/0x7d0 [ 328.479391][T12565] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 328.485350][T12565] do_syscall_64+0xf6/0x7d0 [ 328.489830][T12565] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 328.495697][T12565] RIP: 0033:0x45ca69 [ 328.499595][T12565] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:21:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 328.519174][T12565] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 328.527560][T12565] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 328.535506][T12565] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 328.543465][T12565] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 328.551413][T12565] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 328.559360][T12565] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 04:21:42 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 328.634395][T12577] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 328.650831][ T6915] minix_free_inode: bit 1 already cleared 04:21:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {0x0, 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 328.712078][T12583] MINIX-fs: bad superblock or unable to read bitmaps [ 328.720666][ T6785] minix_free_inode: bit 1 already cleared 04:21:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xffffffffffffffcf) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) fcntl$setlease(r3, 0x400, 0x0) 04:21:43 executing program 5 (fault-call:19 fault-nth:5): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 328.868898][T12588] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 328.881678][T12590] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:43 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1fffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:43 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) setpriority(0x1, r0, 0xa164) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = gettid() ptrace$setopts(0x4200, r2, 0x0, 0x40) tkill(r2, 0x3f) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) prlimit64(r2, 0xd, &(0x7f0000000000), &(0x7f0000000040)) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) [ 329.033297][ T6915] minix_free_inode: bit 1 already cleared [ 329.048137][T12607] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:43 executing program 1 (fault-call:6 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 329.117384][T12611] FAULT_INJECTION: forcing a failure. [ 329.117384][T12611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 329.132089][T12611] CPU: 0 PID: 12611 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 329.140414][T12611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.150498][T12611] Call Trace: [ 329.153776][T12611] dump_stack+0x188/0x20d [ 329.158091][T12611] should_fail.cold+0x5/0xa [ 329.162573][T12611] ? fault_create_debugfs_attr+0x140/0x140 [ 329.168406][T12611] __alloc_pages_nodemask+0x17a/0x810 [ 329.173755][T12611] ? debug_smp_processor_id+0x2f/0x185 [ 329.179201][T12611] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 329.185961][T12611] ? __kmalloc_node+0x38/0x60 [ 329.190627][T12611] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 329.196429][T12611] alloc_pages_current+0xff/0x200 [ 329.201442][T12611] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 329.207413][T12611] push_pipe+0x2af/0x690 [ 329.211648][T12611] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 329.217261][T12611] ? aa_file_perm+0x594/0x14d0 [ 329.222004][T12611] ? iov_iter_for_each_range+0x750/0x750 [ 329.227614][T12611] ? debug_smp_processor_id+0x2f/0x185 [ 329.233095][T12611] ? lock_downgrade+0x840/0x840 [ 329.237928][T12611] default_file_splice_read.isra.0+0x1d5/0xa20 [ 329.244076][T12611] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 329.250128][T12611] ? iter_file_splice_write+0xb10/0xb10 [ 329.255659][T12611] ? aa_path_link+0x300/0x300 [ 329.260361][T12611] ? aa_file_perm+0x594/0x14d0 [ 329.265111][T12611] ? debug_smp_processor_id+0x2f/0x185 [ 329.270555][T12611] ? lock_downgrade+0x840/0x840 [ 329.275401][T12611] ? find_held_lock+0x2d/0x110 [ 329.280151][T12611] ? fsnotify+0x7df/0xb50 [ 329.284463][T12611] ? fsnotify_parent+0xbf/0x2d0 [ 329.289302][T12611] ? fsnotify_first_mark+0x200/0x200 [ 329.294580][T12611] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 329.300546][T12611] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 329.306345][T12611] ? security_file_permission+0x8c/0x470 [ 329.312012][T12611] do_splice_to+0x137/0x170 [ 329.316509][T12611] splice_direct_to_actor+0x307/0x980 [ 329.321872][T12611] ? do_splice_from+0x110/0x110 [ 329.326711][T12611] ? do_splice_to+0x170/0x170 [ 329.331379][T12611] do_splice_direct+0x1b4/0x280 [ 329.336224][T12611] ? splice_direct_to_actor+0x980/0x980 [ 329.341761][T12611] do_sendfile+0x555/0xc50 [ 329.346174][T12611] ? do_compat_pwritev64+0x1b0/0x1b0 [ 329.351450][T12611] ? wait_for_completion+0x270/0x270 [ 329.356715][T12611] ? __sb_end_write+0x101/0x1d0 [ 329.361538][T12611] ? vfs_write+0x161/0x5d0 [ 329.365944][T12611] __x64_sys_sendfile64+0x1cc/0x210 [ 329.371127][T12611] ? __ia32_sys_sendfile+0x220/0x220 [ 329.376396][T12611] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 329.382361][T12611] ? do_syscall_64+0x21/0x7d0 [ 329.387022][T12611] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 329.392988][T12611] do_syscall_64+0xf6/0x7d0 [ 329.397470][T12611] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 329.403336][T12611] RIP: 0033:0x45ca69 [ 329.407221][T12611] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.426818][T12611] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 329.435222][T12611] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 329.443181][T12611] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 329.451191][T12611] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 329.459155][T12611] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 329.467108][T12611] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 329.559410][T12610] MINIX-fs: bad superblock or unable to read bitmaps 04:21:43 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {0x0, 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 329.652253][T12619] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 329.687341][ T6785] minix_free_inode: bit 1 already cleared 04:21:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 329.767186][T12625] FAULT_INJECTION: forcing a failure. [ 329.767186][T12625] name failslab, interval 1, probability 0, space 0, times 0 04:21:43 executing program 5 (fault-call:19 fault-nth:6): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 329.813919][T12625] CPU: 0 PID: 12625 Comm: syz-executor.1 Not tainted 5.7.0-syzkaller #0 [ 329.822270][T12625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.832324][T12625] Call Trace: [ 329.835624][T12625] dump_stack+0x188/0x20d [ 329.839980][T12625] should_fail.cold+0x5/0xa [ 329.844487][T12625] ? lock_downgrade+0x840/0x840 [ 329.849329][T12625] ? fault_create_debugfs_attr+0x140/0x140 [ 329.855142][T12625] should_failslab+0x5/0xf [ 329.859567][T12625] __kmalloc+0x2d9/0x7a0 04:21:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000140)={0x8001, "0bdb3d05ff09a4dd481494f0b740d6d92a2f01fee15339b45a5ecb23491f386b", 0x20, 0x10000, 0x1, 0x1, 0x5}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000080)=""/46) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) renameat2(r1, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x2) [ 329.863827][T12625] ? __x64_sys_memfd_create+0x136/0x490 [ 329.869374][T12625] ? wait_for_completion+0x270/0x270 [ 329.874661][T12625] ? __this_cpu_preempt_check+0x28/0x190 [ 329.880387][T12625] ? __sb_end_write+0x101/0x1d0 [ 329.885236][T12625] ? strnlen_user+0x1f5/0x2e0 [ 329.889920][T12625] __x64_sys_memfd_create+0x136/0x490 [ 329.895297][T12625] ? memfd_fcntl+0x1330/0x1330 [ 329.900058][T12625] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 329.905539][T12630] MINIX-fs: bad superblock or unable to read bitmaps 04:21:44 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 329.906035][T12625] ? do_syscall_64+0x21/0x7d0 [ 329.906049][T12625] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 329.906069][T12625] do_syscall_64+0xf6/0x7d0 [ 329.927833][T12625] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 329.933724][T12625] RIP: 0033:0x45ca69 [ 329.937623][T12625] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.957222][T12625] RSP: 002b:00007f01c88eda68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 329.965644][T12625] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 329.973621][T12625] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 329.981591][T12625] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 329.989560][T12625] R10: 00000000000034f9 R11: 0000000000000246 R12: 0000000000000007 [ 329.997527][T12625] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f01c88ee6d4 04:21:44 executing program 1 (fault-call:6 fault-nth:1): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 330.043327][T12646] FAULT_INJECTION: forcing a failure. [ 330.043327][T12646] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.066333][T12646] CPU: 0 PID: 12646 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 330.074684][T12646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.084734][T12646] Call Trace: [ 330.088034][T12646] dump_stack+0x188/0x20d [ 330.092384][T12646] should_fail.cold+0x5/0xa [ 330.092405][T12646] ? fault_create_debugfs_attr+0x140/0x140 [ 330.092430][T12646] __alloc_pages_nodemask+0x17a/0x810 [ 330.092448][T12646] ? debug_smp_processor_id+0x2f/0x185 [ 330.104526][T12633] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 330.108073][T12646] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 330.108089][T12646] ? __kmalloc_node+0x38/0x60 [ 330.108108][T12646] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 330.108134][T12646] alloc_pages_current+0xff/0x200 [ 330.108148][T12646] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 330.108170][T12646] push_pipe+0x2af/0x690 [ 330.154290][T12646] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 330.159927][T12646] ? aa_file_perm+0x594/0x14d0 [ 330.164701][T12646] ? iov_iter_for_each_range+0x750/0x750 [ 330.170331][T12646] ? debug_smp_processor_id+0x2f/0x185 [ 330.175795][T12646] ? lock_downgrade+0x840/0x840 [ 330.180660][T12646] default_file_splice_read.isra.0+0x1d5/0xa20 [ 330.186823][T12646] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 330.192891][T12646] ? iter_file_splice_write+0xb10/0xb10 [ 330.198434][T12646] ? aa_path_link+0x300/0x300 [ 330.203112][T12646] ? aa_file_perm+0x594/0x14d0 [ 330.207875][T12646] ? debug_smp_processor_id+0x2f/0x185 [ 330.213342][T12646] ? lock_downgrade+0x840/0x840 [ 330.218214][T12646] ? find_held_lock+0x2d/0x110 [ 330.222981][T12646] ? fsnotify+0x7df/0xb50 [ 330.227395][T12646] ? fsnotify_parent+0xbf/0x2d0 [ 330.229539][T12655] FAULT_INJECTION: forcing a failure. [ 330.229539][T12655] name failslab, interval 1, probability 0, space 0, times 0 [ 330.232244][T12646] ? fsnotify_first_mark+0x200/0x200 [ 330.232266][T12646] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 330.232283][T12646] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 330.232305][T12646] ? security_file_permission+0x8c/0x470 [ 330.232329][T12646] do_splice_to+0x137/0x170 [ 330.271972][T12646] splice_direct_to_actor+0x307/0x980 [ 330.277335][T12646] ? do_splice_from+0x110/0x110 [ 330.282170][T12646] ? do_splice_to+0x170/0x170 [ 330.286849][T12646] do_splice_direct+0x1b4/0x280 [ 330.291690][T12646] ? splice_direct_to_actor+0x980/0x980 [ 330.297229][T12646] do_sendfile+0x555/0xc50 [ 330.301637][T12646] ? do_compat_pwritev64+0x1b0/0x1b0 [ 330.306916][T12646] ? wait_for_completion+0x270/0x270 [ 330.312197][T12646] ? __sb_end_write+0x101/0x1d0 [ 330.317043][T12646] ? vfs_write+0x161/0x5d0 [ 330.321458][T12646] __x64_sys_sendfile64+0x1cc/0x210 [ 330.326668][T12646] ? __ia32_sys_sendfile+0x220/0x220 [ 330.331945][T12646] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 330.337923][T12646] ? do_syscall_64+0x21/0x7d0 [ 330.340674][T12652] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 330.342593][T12646] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 330.342615][T12646] do_syscall_64+0xf6/0x7d0 [ 330.342641][T12646] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 330.342652][T12646] RIP: 0033:0x45ca69 [ 330.342667][T12646] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:21:44 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 330.342675][T12646] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 330.342687][T12646] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 330.342694][T12646] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 330.342701][T12646] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 330.342709][T12646] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 330.342717][T12646] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 330.380543][T12655] CPU: 0 PID: 12655 Comm: syz-executor.1 Not tainted 5.7.0-syzkaller #0 [ 330.448442][T12655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.458490][T12655] Call Trace: [ 330.461794][T12655] dump_stack+0x188/0x20d [ 330.466136][T12655] should_fail.cold+0x5/0xa [ 330.470637][T12655] ? lock_downgrade+0x840/0x840 [ 330.475481][T12655] ? fault_create_debugfs_attr+0x140/0x140 [ 330.481385][T12655] ? shmem_destroy_inode+0x70/0x70 [ 330.486499][T12655] should_failslab+0x5/0xf [ 330.490917][T12655] kmem_cache_alloc+0x29b/0x740 [ 330.495765][T12655] ? find_held_lock+0x2d/0x110 [ 330.500526][T12655] ? __alloc_fd+0x46d/0x600 [ 330.505034][T12655] ? shmem_destroy_inode+0x70/0x70 [ 330.510133][T12655] shmem_alloc_inode+0x18/0x40 [ 330.514882][T12655] ? shmem_destroy_inode+0x70/0x70 [ 330.519978][T12655] alloc_inode+0x61/0x1e0 [ 330.524292][T12655] new_inode_pseudo+0x14/0xe0 [ 330.528961][T12655] new_inode+0x1b/0x40 [ 330.533028][T12655] shmem_get_inode+0x84/0x7e0 [ 330.537789][T12655] __shmem_file_setup.part.0+0x7a/0x2b0 [ 330.543314][T12655] shmem_file_setup+0x61/0x90 [ 330.547982][T12655] __x64_sys_memfd_create+0x2bb/0x490 [ 330.553339][T12655] ? memfd_fcntl+0x1330/0x1330 [ 330.558092][T12655] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 330.564071][T12655] ? do_syscall_64+0x21/0x7d0 [ 330.568745][T12655] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 330.574730][T12655] do_syscall_64+0xf6/0x7d0 [ 330.579236][T12655] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 330.585120][T12655] RIP: 0033:0x45ca69 [ 330.589014][T12655] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.608698][T12655] RSP: 002b:00007f01c88eda68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 330.617124][T12655] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 330.625086][T12655] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 330.633047][T12655] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 04:21:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:44 executing program 1 (fault-call:6 fault-nth:2): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 330.640997][T12655] R10: 00000000000034f9 R11: 0000000000000246 R12: 0000000000000007 [ 330.648972][T12655] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f01c88ee6d4 [ 330.666564][ T6785] minix_free_inode: bit 1 already cleared 04:21:44 executing program 5 (fault-call:19 fault-nth:7): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 330.776080][T12662] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 330.819325][T12670] FAULT_INJECTION: forcing a failure. [ 330.819325][T12670] name failslab, interval 1, probability 0, space 0, times 0 [ 330.835439][T12670] CPU: 0 PID: 12670 Comm: syz-executor.1 Not tainted 5.7.0-syzkaller #0 [ 330.843781][T12670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.853830][T12670] Call Trace: [ 330.857116][T12670] dump_stack+0x188/0x20d [ 330.861511][T12670] should_fail.cold+0x5/0xa 04:21:45 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0xa0000, 0x0) fcntl$setstatus(r0, 0x4, 0x40c00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000280)=""/251) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x6, &(0x7f0000000400)={r5, @in6={{0xa, 0x0, 0x0, @dev}}, [0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, &(0x7f0000000240)=0x100) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x44, 0x0, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x40}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x81}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x6}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x4008000) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e23, 0x8000000, @remote, 0x2}}, 0x0, 0xa5f}, 0x90) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0xffffffffffffe677) write$cgroup_subtree(r2, 0x0, 0x4ea00) [ 330.866041][T12670] ? lock_downgrade+0x840/0x840 [ 330.870908][T12670] ? fault_create_debugfs_attr+0x140/0x140 [ 330.876781][T12670] should_failslab+0x5/0xf [ 330.881329][T12670] kmem_cache_alloc+0x29b/0x740 [ 330.886195][T12670] ? timestamp_truncate+0x20f/0x2f0 [ 330.891399][T12670] __d_alloc+0x2a/0x920 [ 330.895563][T12670] ? ktime_get_coarse_real_ts64+0x19b/0x280 [ 330.901459][T12670] d_alloc_pseudo+0x19/0x70 [ 330.905957][T12670] alloc_file_pseudo+0xc6/0x250 [ 330.910789][T12670] ? lockdep_init_map_waits+0x26a/0x890 [ 330.916324][T12670] ? alloc_file+0x590/0x590 [ 330.920830][T12670] ? lockdep_annotate_inode_mutex_key+0x3c/0x70 [ 330.927065][T12670] ? shmem_get_inode+0x487/0x7e0 [ 330.931990][T12670] __shmem_file_setup.part.0+0x102/0x2b0 [ 330.937606][T12670] shmem_file_setup+0x61/0x90 [ 330.942264][T12670] __x64_sys_memfd_create+0x2bb/0x490 [ 330.947621][T12670] ? memfd_fcntl+0x1330/0x1330 [ 330.952384][T12670] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 330.958349][T12670] ? do_syscall_64+0x21/0x7d0 [ 330.963008][T12670] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 330.968971][T12670] do_syscall_64+0xf6/0x7d0 [ 330.973457][T12670] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 330.979326][T12670] RIP: 0033:0x45ca69 [ 330.983199][T12670] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.002782][T12670] RSP: 002b:00007f01c88eda68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 331.011170][T12670] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 331.019136][T12670] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 331.027101][T12670] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 331.035082][T12670] R10: 00000000000034f9 R11: 0000000000000246 R12: 0000000000000007 [ 331.043039][T12670] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f01c88ee6d4 04:21:45 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x2e000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 331.091025][T12663] MINIX-fs: bad superblock or unable to read bitmaps [ 331.100993][T12669] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 331.193898][ T6785] minix_free_inode: bit 1 already cleared [ 331.214337][T12682] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:45 executing program 1 (fault-call:6 fault-nth:3): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 331.278228][T12686] FAULT_INJECTION: forcing a failure. [ 331.278228][T12686] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 331.323085][T12690] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 331.351055][T12686] CPU: 1 PID: 12686 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 331.359411][T12686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.369461][T12686] Call Trace: [ 331.372759][T12686] dump_stack+0x188/0x20d [ 331.377104][T12686] should_fail.cold+0x5/0xa [ 331.381617][T12686] ? fault_create_debugfs_attr+0x140/0x140 [ 331.387438][T12686] __alloc_pages_nodemask+0x17a/0x810 [ 331.392813][T12686] ? debug_smp_processor_id+0x2f/0x185 [ 331.398278][T12686] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 331.405035][T12686] ? __kmalloc_node+0x38/0x60 [ 331.409716][T12686] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 331.414228][T12699] FAULT_INJECTION: forcing a failure. [ 331.414228][T12699] name failslab, interval 1, probability 0, space 0, times 0 [ 331.415526][T12686] alloc_pages_current+0xff/0x200 [ 331.415544][T12686] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 331.415563][T12686] push_pipe+0x2af/0x690 [ 331.415585][T12686] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 331.448961][T12686] ? aa_file_perm+0x594/0x14d0 [ 331.453716][T12686] ? iov_iter_for_each_range+0x750/0x750 [ 331.459336][T12686] ? debug_smp_processor_id+0x2f/0x185 [ 331.464788][T12686] ? lock_downgrade+0x840/0x840 [ 331.469633][T12686] default_file_splice_read.isra.0+0x1d5/0xa20 [ 331.475785][T12686] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 331.481848][T12686] ? iter_file_splice_write+0xb10/0xb10 [ 331.487393][T12686] ? aa_path_link+0x300/0x300 [ 331.492054][T12686] ? aa_file_perm+0x594/0x14d0 [ 331.496805][T12686] ? debug_smp_processor_id+0x2f/0x185 [ 331.502253][T12686] ? lock_downgrade+0x840/0x840 [ 331.507099][T12686] ? find_held_lock+0x2d/0x110 [ 331.511871][T12686] ? fsnotify+0x7df/0xb50 [ 331.516191][T12686] ? fsnotify_parent+0xbf/0x2d0 [ 331.521028][T12686] ? fsnotify_first_mark+0x200/0x200 [ 331.526300][T12686] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 331.532271][T12686] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 331.538078][T12686] ? security_file_permission+0x8c/0x470 [ 331.543701][T12686] do_splice_to+0x137/0x170 [ 331.548192][T12686] splice_direct_to_actor+0x307/0x980 [ 331.553552][T12686] ? do_splice_from+0x110/0x110 [ 331.558394][T12686] ? do_splice_to+0x170/0x170 [ 331.563072][T12686] do_splice_direct+0x1b4/0x280 [ 331.567915][T12686] ? splice_direct_to_actor+0x980/0x980 [ 331.573462][T12686] do_sendfile+0x555/0xc50 [ 331.577882][T12686] ? do_compat_pwritev64+0x1b0/0x1b0 [ 331.583176][T12686] ? wait_for_completion+0x270/0x270 [ 331.588462][T12686] ? __sb_end_write+0x101/0x1d0 [ 331.593293][T12686] ? vfs_write+0x161/0x5d0 [ 331.597694][T12686] __x64_sys_sendfile64+0x1cc/0x210 [ 331.602878][T12686] ? __ia32_sys_sendfile+0x220/0x220 [ 331.608153][T12686] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 331.614129][T12686] ? do_syscall_64+0x21/0x7d0 [ 331.618797][T12686] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 331.624769][T12686] do_syscall_64+0xf6/0x7d0 [ 331.629273][T12686] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 331.635145][T12686] RIP: 0033:0x45ca69 [ 331.639022][T12686] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.658614][T12686] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 04:21:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0x4240a2a0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x3) [ 331.667007][T12686] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 331.674957][T12686] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 331.682912][T12686] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 331.690873][T12686] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 331.698838][T12686] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 331.706825][T12699] CPU: 0 PID: 12699 Comm: syz-executor.1 Not tainted 5.7.0-syzkaller #0 [ 331.715149][T12699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.725194][T12699] Call Trace: [ 331.728491][T12699] dump_stack+0x188/0x20d [ 331.732824][T12699] should_fail.cold+0x5/0xa [ 331.737332][T12699] ? lock_downgrade+0x840/0x840 [ 331.742200][T12699] ? fault_create_debugfs_attr+0x140/0x140 [ 331.748013][T12699] should_failslab+0x5/0xf [ 331.752433][T12699] kmem_cache_alloc+0x29b/0x740 [ 331.757290][T12699] ? lock_downgrade+0x840/0x840 [ 331.762141][T12699] __alloc_file+0x21/0x350 [ 331.766559][T12699] alloc_empty_file+0x6d/0x170 [ 331.771334][T12699] alloc_file+0x5e/0x590 [ 331.775580][T12699] alloc_file_pseudo+0x165/0x250 [ 331.780511][T12699] ? alloc_file+0x590/0x590 [ 331.784996][T12699] ? shmem_get_inode+0x487/0x7e0 [ 331.789926][T12699] __shmem_file_setup.part.0+0x102/0x2b0 [ 331.791480][T12696] MINIX-fs: bad superblock or unable to read bitmaps [ 331.795557][T12699] shmem_file_setup+0x61/0x90 [ 331.795576][T12699] __x64_sys_memfd_create+0x2bb/0x490 [ 331.795596][T12699] ? memfd_fcntl+0x1330/0x1330 [ 331.795612][T12699] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 331.795628][T12699] ? do_syscall_64+0x21/0x7d0 [ 331.795643][T12699] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 331.795660][T12699] do_syscall_64+0xf6/0x7d0 [ 331.795677][T12699] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 331.795688][T12699] RIP: 0033:0x45ca69 [ 331.795702][T12699] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:21:46 executing program 1 (fault-call:6 fault-nth:4): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 331.795710][T12699] RSP: 002b:00007f01c88eda68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 331.795724][T12699] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 331.795731][T12699] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 331.795744][T12699] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 331.899891][T12699] R10: 00000000000034f9 R11: 0000000000000246 R12: 0000000000000007 [ 331.907843][T12699] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f01c88ee6d4 04:21:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:46 executing program 5 (fault-call:19 fault-nth:8): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 331.965855][T12698] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:46 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x3a000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:46 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 332.062522][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 332.062533][ T28] audit: type=1800 audit(1592194906.224:529): pid=12713 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16345 res=0 [ 332.071794][T12713] FAULT_INJECTION: forcing a failure. [ 332.071794][T12713] name failslab, interval 1, probability 0, space 0, times 0 [ 332.144265][ T6785] minix_free_inode: bit 1 already cleared [ 332.148522][T12713] CPU: 0 PID: 12713 Comm: syz-executor.1 Not tainted 5.7.0-syzkaller #0 [ 332.158316][T12713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.168353][T12713] Call Trace: [ 332.171626][T12713] dump_stack+0x188/0x20d [ 332.175941][T12713] should_fail.cold+0x5/0xa [ 332.180428][T12713] ? lock_downgrade+0x840/0x840 [ 332.185257][T12713] ? fault_create_debugfs_attr+0x140/0x140 [ 332.191045][T12713] should_failslab+0x5/0xf [ 332.195442][T12713] kmem_cache_alloc+0x29b/0x740 [ 332.200272][T12713] ? kmem_cache_alloc+0x358/0x740 [ 332.205287][T12713] security_file_alloc+0x34/0x160 [ 332.210292][T12713] __alloc_file+0xd8/0x350 [ 332.214691][T12713] alloc_empty_file+0x6d/0x170 [ 332.219433][T12713] alloc_file+0x5e/0x590 [ 332.223666][T12713] alloc_file_pseudo+0x165/0x250 [ 332.228592][T12713] ? alloc_file+0x590/0x590 [ 332.233075][T12713] ? shmem_get_inode+0x487/0x7e0 [ 332.237994][T12713] __shmem_file_setup.part.0+0x102/0x2b0 [ 332.243605][T12713] shmem_file_setup+0x61/0x90 [ 332.248263][T12713] __x64_sys_memfd_create+0x2bb/0x490 [ 332.253612][T12713] ? memfd_fcntl+0x1330/0x1330 [ 332.258365][T12713] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 332.264332][T12713] ? do_syscall_64+0x21/0x7d0 [ 332.269001][T12713] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 332.274977][T12713] do_syscall_64+0xf6/0x7d0 [ 332.279464][T12713] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 332.285335][T12713] RIP: 0033:0x45ca69 [ 332.289209][T12713] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.308786][T12713] RSP: 002b:00007f01c88eda68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 332.317172][T12713] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca69 [ 332.325120][T12713] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 332.333068][T12713] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 332.341016][T12713] R10: 00000000000034f9 R11: 0000000000000246 R12: 0000000000000007 [ 332.348978][T12713] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f01c88ee6d4 [ 332.370823][T12712] MINIX-fs: bad superblock or unable to read bitmaps [ 332.386638][T12719] FAULT_INJECTION: forcing a failure. [ 332.386638][T12719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 332.406469][ T28] audit: type=1800 audit(1592194906.574:530): pid=12723 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16356 res=0 [ 332.430735][T12719] CPU: 1 PID: 12719 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 04:21:46 executing program 1 (fault-call:6 fault-nth:5): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 332.439071][T12719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.449125][T12719] Call Trace: [ 332.452424][T12719] dump_stack+0x188/0x20d [ 332.456760][T12719] should_fail.cold+0x5/0xa [ 332.461264][T12719] ? fault_create_debugfs_attr+0x140/0x140 [ 332.467079][T12719] __alloc_pages_nodemask+0x17a/0x810 [ 332.472452][T12719] ? debug_smp_processor_id+0x2f/0x185 [ 332.477901][T12719] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 332.484639][T12719] ? __kmalloc_node+0x38/0x60 [ 332.489294][T12719] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 332.495083][T12719] alloc_pages_current+0xff/0x200 [ 332.500087][T12719] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 332.506046][T12719] push_pipe+0x2af/0x690 [ 332.510271][T12719] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 332.515879][T12719] ? aa_file_perm+0x594/0x14d0 [ 332.520619][T12719] ? iov_iter_for_each_range+0x750/0x750 [ 332.526228][T12719] ? debug_smp_processor_id+0x2f/0x185 [ 332.531664][T12719] ? lock_downgrade+0x840/0x840 [ 332.536543][T12719] default_file_splice_read.isra.0+0x1d5/0xa20 [ 332.542678][T12719] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 332.548720][T12719] ? iter_file_splice_write+0xb10/0xb10 [ 332.554247][T12719] ? aa_path_link+0x300/0x300 [ 332.558898][T12719] ? aa_file_perm+0x594/0x14d0 [ 332.563674][T12719] ? debug_smp_processor_id+0x2f/0x185 [ 332.569196][T12719] ? lock_downgrade+0x840/0x840 [ 332.574129][T12719] ? find_held_lock+0x2d/0x110 [ 332.578865][T12719] ? fsnotify+0x7df/0xb50 [ 332.583170][T12719] ? fsnotify_parent+0xbf/0x2d0 [ 332.588009][T12719] ? fsnotify_first_mark+0x200/0x200 [ 332.593284][T12719] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 332.599250][T12719] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 332.605133][T12719] ? security_file_permission+0x8c/0x470 [ 332.610755][T12719] do_splice_to+0x137/0x170 [ 332.615244][T12719] splice_direct_to_actor+0x307/0x980 [ 332.620616][T12719] ? do_splice_from+0x110/0x110 [ 332.625458][T12719] ? do_splice_to+0x170/0x170 [ 332.630164][T12719] do_splice_direct+0x1b4/0x280 [ 332.634995][T12719] ? splice_direct_to_actor+0x980/0x980 [ 332.640524][T12719] do_sendfile+0x555/0xc50 [ 332.644919][T12719] ? do_compat_pwritev64+0x1b0/0x1b0 [ 332.650182][T12719] ? wait_for_completion+0x270/0x270 [ 332.655442][T12719] ? __sb_end_write+0x101/0x1d0 [ 332.660268][T12719] ? vfs_write+0x161/0x5d0 [ 332.664662][T12719] __x64_sys_sendfile64+0x1cc/0x210 [ 332.669839][T12719] ? __ia32_sys_sendfile+0x220/0x220 [ 332.675100][T12719] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 332.681065][T12719] ? do_syscall_64+0x21/0x7d0 [ 332.685739][T12719] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 332.691708][T12719] do_syscall_64+0xf6/0x7d0 [ 332.696216][T12719] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 332.702093][T12719] RIP: 0033:0x45ca69 [ 332.705965][T12719] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.725582][T12719] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 332.734108][T12719] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 332.742063][T12719] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 332.750009][T12719] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 332.757989][T12719] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 332.765945][T12719] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 04:21:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0x37) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x800004009fd) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 332.812397][T12723] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 332.877995][ T28] audit: type=1800 audit(1592194907.044:531): pid=12723 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16356 res=0 [ 332.899549][T12733] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:47 executing program 5 (fault-call:19 fault-nth:9): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 332.925774][T12732] FAULT_INJECTION: forcing a failure. [ 332.925774][T12732] name failslab, interval 1, probability 0, space 0, times 0 [ 332.965868][ T28] audit: type=1800 audit(1592194907.084:532): pid=12732 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16359 res=0 [ 332.993313][T12732] CPU: 0 PID: 12732 Comm: syz-executor.1 Not tainted 5.7.0-syzkaller #0 [ 333.001677][T12732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.011735][T12732] Call Trace: [ 333.015038][T12732] dump_stack+0x188/0x20d [ 333.019381][T12732] should_fail.cold+0x5/0xa [ 333.023893][T12732] ? fault_create_debugfs_attr+0x140/0x140 [ 333.029706][T12732] should_failslab+0x5/0xf [ 333.034125][T12732] __kmalloc+0x2d9/0x7a0 [ 333.038375][T12732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 333.043793][T12736] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 333.044353][T12732] ? tomoyo_realpath_from_path+0xc2/0x620 [ 333.044372][T12732] ? lock_release+0x800/0x800 [ 333.044397][T12732] ? print_usage_bug+0x240/0x240 [ 333.067983][T12732] tomoyo_realpath_from_path+0xc2/0x620 [ 333.073544][T12732] ? tomoyo_profile+0x42/0x50 [ 333.078235][T12732] tomoyo_path_perm+0x214/0x400 [ 333.083086][T12732] ? tomoyo_path_perm+0x1ba/0x400 [ 333.088112][T12732] ? tomoyo_check_open_permission+0x370/0x370 [ 333.094183][T12732] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 333.100159][T12732] ? __fget_files+0x30d/0x500 [ 333.104870][T12732] ? rcu_read_lock_any_held+0xcd/0xf0 [ 333.110237][T12732] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 333.115528][T12732] security_path_truncate+0xeb/0x150 [ 333.120816][T12732] do_sys_ftruncate+0x3fc/0x570 [ 333.125676][T12732] do_syscall_64+0xf6/0x7d0 [ 333.129563][T12743] MINIX-fs: bad superblock or unable to read bitmaps [ 333.130178][T12732] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 333.130191][T12732] RIP: 0033:0x45ca37 [ 333.130204][T12732] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 3c e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.130217][T12732] RSP: 002b:00007f01c88eda68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 04:21:47 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x185, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 333.174599][T12732] RAX: ffffffffffffffda RBX: 00000000005095c0 RCX: 000000000045ca37 [ 333.178568][T12747] FAULT_INJECTION: forcing a failure. [ 333.178568][T12747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 333.182561][T12732] RDX: 0000000020000030 RSI: 00000000000069f2 RDI: 0000000000000008 [ 333.182571][T12732] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 333.182579][T12732] R10: 00000000000034f9 R11: 0000000000000217 R12: 0000000000000007 [ 333.182588][T12732] R13: 0000000000000c0f R14: 00000000004ce5c9 R15: 00007f01c88ee6d4 [ 333.230821][T12747] CPU: 1 PID: 12747 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 333.239165][T12747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.249218][T12747] Call Trace: [ 333.252514][T12747] dump_stack+0x188/0x20d [ 333.256852][T12747] should_fail.cold+0x5/0xa [ 333.261379][T12747] ? fault_create_debugfs_attr+0x140/0x140 [ 333.266758][ T28] audit: type=1800 audit(1592194907.114:533): pid=12736 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16315 res=0 [ 333.267188][T12747] __alloc_pages_nodemask+0x17a/0x810 [ 333.267204][T12747] ? debug_smp_processor_id+0x2f/0x185 [ 333.267222][T12747] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 333.267234][T12747] ? __kmalloc_node+0x38/0x60 [ 333.267253][T12747] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 333.296918][T12732] ERROR: Out of memory at tomoyo_realpath_from_path. [ 333.303589][T12747] alloc_pages_current+0xff/0x200 [ 333.303607][T12747] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 333.303625][T12747] push_pipe+0x2af/0x690 [ 333.303649][T12747] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 333.303668][T12747] ? aa_file_perm+0x594/0x14d0 [ 333.303684][T12747] ? iov_iter_for_each_range+0x750/0x750 [ 333.303700][T12747] ? debug_smp_processor_id+0x2f/0x185 [ 333.357406][T12747] ? lock_downgrade+0x840/0x840 [ 333.362239][T12747] default_file_splice_read.isra.0+0x1d5/0xa20 [ 333.368378][T12747] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 333.374422][T12747] ? iter_file_splice_write+0xb10/0xb10 [ 333.379944][T12747] ? aa_path_link+0x300/0x300 [ 333.384604][T12747] ? aa_file_perm+0x594/0x14d0 [ 333.389384][T12747] ? debug_smp_processor_id+0x2f/0x185 [ 333.394843][T12747] ? lock_downgrade+0x840/0x840 [ 333.399692][T12747] ? find_held_lock+0x2d/0x110 [ 333.404432][T12747] ? fsnotify+0x7df/0xb50 [ 333.408736][T12747] ? fsnotify_parent+0xbf/0x2d0 [ 333.413577][T12747] ? fsnotify_first_mark+0x200/0x200 [ 333.418944][T12747] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 333.424924][T12747] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 333.430767][T12747] ? security_file_permission+0x8c/0x470 [ 333.436388][T12747] do_splice_to+0x137/0x170 [ 333.440875][T12747] splice_direct_to_actor+0x307/0x980 [ 333.446227][T12747] ? do_splice_from+0x110/0x110 [ 333.451055][T12747] ? do_splice_to+0x170/0x170 [ 333.455778][T12747] do_splice_direct+0x1b4/0x280 [ 333.460619][T12747] ? splice_direct_to_actor+0x980/0x980 [ 333.466164][T12747] do_sendfile+0x555/0xc50 [ 333.470564][T12747] ? do_compat_pwritev64+0x1b0/0x1b0 [ 333.475847][T12747] ? wait_for_completion+0x270/0x270 [ 333.481134][T12747] ? __sb_end_write+0x101/0x1d0 [ 333.485987][T12747] ? vfs_write+0x161/0x5d0 [ 333.490568][T12747] __x64_sys_sendfile64+0x1cc/0x210 [ 333.495787][T12747] ? __ia32_sys_sendfile+0x220/0x220 [ 333.501064][T12747] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 333.507027][T12747] ? do_syscall_64+0x21/0x7d0 [ 333.511702][T12747] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 333.517682][T12747] do_syscall_64+0xf6/0x7d0 [ 333.522182][T12747] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 333.528051][T12747] RIP: 0033:0x45ca69 [ 333.531923][T12747] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.551507][T12747] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 333.559907][T12747] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 333.567852][T12747] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 333.575818][T12747] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 333.583775][T12747] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 333.591740][T12747] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 333.614227][ T6785] minix_free_inode: bit 1 already cleared 04:21:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:47 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 333.810002][ T28] audit: type=1800 audit(1592194907.974:534): pid=12757 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16315 res=0 [ 333.880202][ T28] audit: type=1800 audit(1592194908.044:535): pid=12763 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16369 res=0 [ 333.885168][T12756] MINIX-fs: bad superblock or unable to read bitmaps [ 333.927131][ T28] audit: type=1800 audit(1592194908.094:536): pid=12765 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 04:21:48 executing program 5 (fault-call:19 fault-nth:10): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000280)=""/221, &(0x7f0000000100)=0xdd) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(r4, 0xc01c64a3, &(0x7f0000000140)={0x3, 0x8000, 0x401, 0x1, 0x0, 0x20, 0x73}) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x6, &(0x7f0000000400)={r7, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r7, 0x200, 0x4955, 0x6, 0x64, 0x2}, &(0x7f0000000040)=0x14) [ 333.972397][T12757] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 333.987413][T12763] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 334.029844][T12765] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 334.112927][ T28] audit: type=1800 audit(1592194908.194:537): pid=12757 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16315 res=0 04:21:48 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xd, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:48 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x185, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:48 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 334.320339][ T6785] minix_free_inode: bit 1 already cleared [ 334.327576][ T6915] minix_free_inode: bit 1 already cleared [ 334.347134][ T28] audit: type=1800 audit(1592194908.514:538): pid=12786 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15938 res=0 04:21:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000200)) r3 = accept4$x25(r0, &(0x7f0000000080)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80800) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) [ 334.348676][T12784] FAULT_INJECTION: forcing a failure. [ 334.348676][T12784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.449900][T12784] CPU: 0 PID: 12784 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 334.458253][T12784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.468343][T12784] Call Trace: [ 334.471618][T12784] dump_stack+0x188/0x20d [ 334.475940][T12784] should_fail.cold+0x5/0xa [ 334.480434][T12784] ? fault_create_debugfs_attr+0x140/0x140 [ 334.486252][T12784] __alloc_pages_nodemask+0x17a/0x810 [ 334.491620][T12784] ? debug_smp_processor_id+0x2f/0x185 [ 334.497071][T12784] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 334.503831][T12784] ? __kmalloc_node+0x38/0x60 [ 334.508499][T12784] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 334.514298][T12784] alloc_pages_current+0xff/0x200 [ 334.519311][T12784] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 334.525281][T12784] push_pipe+0x2af/0x690 [ 334.529551][T12784] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 334.535173][T12784] ? aa_file_perm+0x594/0x14d0 [ 334.539970][T12784] ? iov_iter_for_each_range+0x750/0x750 [ 334.545597][T12784] ? debug_smp_processor_id+0x2f/0x185 [ 334.551031][T12784] ? lock_downgrade+0x840/0x840 [ 334.555879][T12784] default_file_splice_read.isra.0+0x1d5/0xa20 [ 334.562063][T12784] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 334.568120][T12784] ? iter_file_splice_write+0xb10/0xb10 [ 334.573663][T12784] ? aa_path_link+0x300/0x300 [ 334.578329][T12784] ? aa_file_perm+0x594/0x14d0 [ 334.583069][T12784] ? debug_smp_processor_id+0x2f/0x185 [ 334.588508][T12784] ? lock_downgrade+0x840/0x840 [ 334.593395][T12784] ? find_held_lock+0x2d/0x110 [ 334.598159][T12784] ? fsnotify+0x7df/0xb50 [ 334.602478][T12784] ? fsnotify_parent+0xbf/0x2d0 [ 334.607351][T12784] ? fsnotify_first_mark+0x200/0x200 [ 334.612618][T12784] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 334.618576][T12784] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 334.624374][T12784] ? security_file_permission+0x8c/0x470 [ 334.630030][T12784] do_splice_to+0x137/0x170 [ 334.634524][T12784] splice_direct_to_actor+0x307/0x980 [ 334.639888][T12784] ? do_splice_from+0x110/0x110 [ 334.644729][T12784] ? do_splice_to+0x170/0x170 [ 334.649400][T12784] do_splice_direct+0x1b4/0x280 [ 334.654240][T12784] ? splice_direct_to_actor+0x980/0x980 [ 334.659798][T12784] do_sendfile+0x555/0xc50 [ 334.664215][T12784] ? do_compat_pwritev64+0x1b0/0x1b0 [ 334.669499][T12784] ? wait_for_completion+0x270/0x270 [ 334.674786][T12784] ? __sb_end_write+0x101/0x1d0 [ 334.679669][T12784] ? vfs_write+0x161/0x5d0 [ 334.684075][T12784] __x64_sys_sendfile64+0x1cc/0x210 [ 334.689262][T12784] ? __ia32_sys_sendfile+0x220/0x220 [ 334.694536][T12784] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 334.700521][T12784] ? do_syscall_64+0x21/0x7d0 [ 334.705189][T12784] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 334.711197][T12784] do_syscall_64+0xf6/0x7d0 [ 334.715691][T12784] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 334.721586][T12784] RIP: 0033:0x45ca69 [ 334.725470][T12784] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.745067][T12784] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 334.753482][T12784] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 334.761458][T12784] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 334.769403][T12784] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 334.777365][T12784] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 334.785330][T12784] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 334.904950][T12788] MINIX-fs: bad superblock or unable to read bitmaps [ 334.917169][T12786] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 334.946725][T12791] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:49 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x185, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x10, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:49 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 335.070109][T12805] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 335.083969][ T6785] minix_free_inode: bit 1 already cleared [ 335.102499][T12807] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:49 executing program 5 (fault-call:19 fault-nth:11): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x127d646) ioctl$RTC_UIE_ON(r2, 0x7003) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ptrace$cont(0x7, 0x0, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3f) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}, 0x1, 0x0, 0x0, 0x260440c9}, 0x0) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x7, 0x2, 0x4, 0x4000, 0x8000, {}, {0x2, 0x1, 0x5, 0x8, 0x5, 0x7, "0000e800"}, 0xffffffff, 0x4, @planes=&(0x7f0000000080)={0x2, 0x7fffffff, @fd, 0x6}, 0x5, 0x0, r2}) kcmp(0x0, r3, 0x3, r4, r5) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 335.159448][ T6915] minix_free_inode: bit 1 already cleared 04:21:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000080)={0xc8, 0xff, 0x2, 0x800, 0x7fff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000100)=""/197}, 0x20) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$kcm(0x2b, 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x301000, 0x0) recvfrom$netrom(r0, &(0x7f0000000240)=""/153, 0x99, 0x40000040, &(0x7f0000000300)={{0x3, @default}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 335.328293][T12814] MINIX-fs: bad superblock or unable to read bitmaps 04:21:49 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x63000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x23, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 335.472280][T12830] FAULT_INJECTION: forcing a failure. [ 335.472280][T12830] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 335.519686][T12827] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 335.529903][T12828] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 335.543795][T12832] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 335.614459][T12840] MINIX-fs: bad superblock or unable to read bitmaps [ 335.624034][T12830] CPU: 0 PID: 12830 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 335.632368][T12830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.642424][T12830] Call Trace: [ 335.645722][T12830] dump_stack+0x188/0x20d [ 335.650068][T12830] should_fail.cold+0x5/0xa [ 335.654585][T12830] ? fault_create_debugfs_attr+0x140/0x140 [ 335.660405][T12830] __alloc_pages_nodemask+0x17a/0x810 [ 335.665778][T12830] ? debug_smp_processor_id+0x2f/0x185 [ 335.671242][T12830] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 335.678004][T12830] ? __kmalloc_node+0x38/0x60 [ 335.682686][T12830] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 335.688502][T12830] alloc_pages_current+0xff/0x200 [ 335.693529][T12830] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 335.699508][T12830] push_pipe+0x2af/0x690 [ 335.703844][T12830] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 335.709481][T12830] ? aa_file_perm+0x594/0x14d0 04:21:49 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x247, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:49 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 335.714245][T12830] ? iov_iter_for_each_range+0x750/0x750 [ 335.719874][T12830] ? debug_smp_processor_id+0x2f/0x185 [ 335.725334][T12830] ? lock_downgrade+0x840/0x840 [ 335.730197][T12830] default_file_splice_read.isra.0+0x1d5/0xa20 [ 335.736455][T12830] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 335.742640][T12830] ? iter_file_splice_write+0xb10/0xb10 [ 335.748197][T12830] ? aa_path_link+0x300/0x300 [ 335.752875][T12830] ? aa_file_perm+0x594/0x14d0 [ 335.757643][T12830] ? debug_smp_processor_id+0x2f/0x185 04:21:49 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x65000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 335.763116][T12830] ? lock_downgrade+0x840/0x840 [ 335.767973][T12830] ? find_held_lock+0x2d/0x110 [ 335.772737][T12830] ? fsnotify+0x7df/0xb50 [ 335.777060][T12830] ? fsnotify_parent+0xbf/0x2d0 [ 335.781911][T12830] ? fsnotify_first_mark+0x200/0x200 [ 335.787182][T12830] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 335.793157][T12830] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 335.798949][T12830] ? security_file_permission+0x8c/0x470 [ 335.804569][T12830] do_splice_to+0x137/0x170 [ 335.809072][T12830] splice_direct_to_actor+0x307/0x980 [ 335.814427][T12830] ? do_splice_from+0x110/0x110 [ 335.819259][T12830] ? do_splice_to+0x170/0x170 [ 335.823934][T12830] do_splice_direct+0x1b4/0x280 [ 335.828767][T12830] ? splice_direct_to_actor+0x980/0x980 [ 335.834302][T12830] do_sendfile+0x555/0xc50 [ 335.838713][T12830] ? do_compat_pwritev64+0x1b0/0x1b0 [ 335.843978][T12830] ? wait_for_completion+0x270/0x270 [ 335.849257][T12830] ? __sb_end_write+0x101/0x1d0 [ 335.854083][T12830] ? vfs_write+0x161/0x5d0 [ 335.858479][T12830] __x64_sys_sendfile64+0x1cc/0x210 [ 335.863671][T12830] ? __ia32_sys_sendfile+0x220/0x220 [ 335.868933][T12830] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 335.874900][T12830] ? do_syscall_64+0x21/0x7d0 [ 335.879552][T12830] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 335.885541][T12830] do_syscall_64+0xf6/0x7d0 [ 335.890032][T12830] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 335.895903][T12830] RIP: 0033:0x45ca69 [ 335.899922][T12830] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.919509][T12830] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 335.927901][T12830] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 335.935852][T12830] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 335.943801][T12830] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 335.951755][T12830] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 335.959714][T12830] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 335.972270][ T6785] minix_free_inode: bit 1 already cleared [ 335.979016][ T6915] minix_free_inode: bit 1 already cleared 04:21:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x48, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 336.216911][T12854] MINIX-fs: bad superblock or unable to read bitmaps [ 336.263828][T12848] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) 04:21:50 executing program 5 (fault-call:19 fault-nth:12): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4c, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:50 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x69020000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$eventfd(r3, &(0x7f0000000000)=0x80000000, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 336.506654][T12865] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 336.524772][T12871] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f4172", 0x247, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:50 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 336.668867][T12880] FAULT_INJECTION: forcing a failure. [ 336.668867][T12880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.690427][ T6785] minix_free_inode: bit 1 already cleared [ 336.710860][ T6915] minix_free_inode: bit 1 already cleared [ 336.722459][T12880] CPU: 0 PID: 12880 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 336.730812][T12880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.740864][T12880] Call Trace: [ 336.744164][T12880] dump_stack+0x188/0x20d [ 336.748512][T12880] should_fail.cold+0x5/0xa [ 336.753036][T12880] ? fault_create_debugfs_attr+0x140/0x140 [ 336.758859][T12880] __alloc_pages_nodemask+0x17a/0x810 [ 336.764232][T12880] ? debug_smp_processor_id+0x2f/0x185 [ 336.769698][T12880] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 336.776459][T12880] ? __kmalloc_node+0x38/0x60 [ 336.781142][T12880] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 336.786962][T12880] alloc_pages_current+0xff/0x200 [ 336.791990][T12880] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 336.797979][T12880] push_pipe+0x2af/0x690 [ 336.802239][T12880] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 336.807878][T12880] ? aa_file_perm+0x594/0x14d0 [ 336.812644][T12880] ? iov_iter_for_each_range+0x750/0x750 [ 336.818273][T12880] ? debug_smp_processor_id+0x2f/0x185 [ 336.823727][T12880] ? lock_downgrade+0x840/0x840 [ 336.828587][T12880] default_file_splice_read.isra.0+0x1d5/0xa20 [ 336.834751][T12880] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 336.840827][T12880] ? iter_file_splice_write+0xb10/0xb10 [ 336.846384][T12880] ? aa_path_link+0x300/0x300 [ 336.851063][T12880] ? aa_file_perm+0x594/0x14d0 [ 336.855833][T12880] ? debug_smp_processor_id+0x2f/0x185 [ 336.861295][T12880] ? lock_downgrade+0x840/0x840 [ 336.866156][T12880] ? find_held_lock+0x2d/0x110 [ 336.870924][T12880] ? fsnotify+0x7df/0xb50 [ 336.875257][T12880] ? fsnotify_parent+0xbf/0x2d0 [ 336.880146][T12880] ? fsnotify_first_mark+0x200/0x200 [ 336.885439][T12880] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 336.891423][T12880] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 336.897251][T12880] ? security_file_permission+0x8c/0x470 [ 336.902892][T12880] do_splice_to+0x137/0x170 [ 336.907396][T12880] splice_direct_to_actor+0x307/0x980 [ 336.912756][T12880] ? do_splice_from+0x110/0x110 [ 336.917594][T12880] ? do_splice_to+0x170/0x170 [ 336.922258][T12880] do_splice_direct+0x1b4/0x280 [ 336.927204][T12880] ? splice_direct_to_actor+0x980/0x980 [ 336.932761][T12880] do_sendfile+0x555/0xc50 [ 336.937166][T12880] ? do_compat_pwritev64+0x1b0/0x1b0 [ 336.942434][T12880] ? wait_for_completion+0x270/0x270 [ 336.947717][T12880] ? __sb_end_write+0x101/0x1d0 [ 336.952572][T12880] ? vfs_write+0x161/0x5d0 [ 336.956980][T12880] __x64_sys_sendfile64+0x1cc/0x210 [ 336.962161][T12880] ? __ia32_sys_sendfile+0x220/0x220 [ 336.967428][T12880] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 336.973395][T12880] ? do_syscall_64+0x21/0x7d0 [ 336.978052][T12880] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 336.984014][T12880] do_syscall_64+0xf6/0x7d0 [ 336.988587][T12880] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 336.994469][T12880] RIP: 0033:0x45ca69 [ 336.998347][T12880] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:21:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 337.017940][T12880] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 337.026326][T12880] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 337.034273][T12880] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 337.042232][T12880] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 337.050190][T12880] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 337.058149][T12880] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 337.120909][T12891] MINIX-fs: bad superblock or unable to read bitmaps 04:21:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x60, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 337.217787][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 337.217797][ T28] audit: type=1800 audit(1592194911.385:551): pid=12900 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16381 res=0 04:21:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, [], [{0x4e, 0x5, 0x1, 0x4, 0x4, 0x55}, {0x0, 0x7f, 0x8, 0xeba, 0x33, 0x1000}]}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x200, 0x7, 0x3}) [ 337.287570][T12892] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 337.303336][ T28] audit: type=1800 audit(1592194911.435:552): pid=12902 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 [ 337.368180][T12900] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 337.430064][T12902] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 337.454008][ T28] audit: type=1800 audit(1592194911.625:553): pid=12886 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16377 res=0 04:21:51 executing program 5 (fault-call:19 fault-nth:13): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 337.474530][T12889] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:51 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:21:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x247, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 337.599563][T12920] MINIX-fs: bad superblock or unable to read bitmaps 04:21:51 executing program 4: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x990000, 0x9, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x980906, 0x80000000, [], @string=&(0x7f0000000000)=0x1}}) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) 04:21:51 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x81030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 337.644259][ T6915] minix_free_inode: bit 1 already cleared [ 337.650413][ T6785] minix_free_inode: bit 1 already cleared [ 337.752769][ T28] audit: type=1800 audit(1592194911.915:554): pid=12930 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16378 res=0 04:21:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x68, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 337.836507][ T28] audit: type=1800 audit(1592194911.925:555): pid=12931 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16379 res=0 [ 337.872632][T12935] FAULT_INJECTION: forcing a failure. [ 337.872632][T12935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 337.900357][T12935] CPU: 0 PID: 12935 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 337.908705][T12935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.918757][T12935] Call Trace: [ 337.922054][T12935] dump_stack+0x188/0x20d [ 337.926383][T12935] should_fail.cold+0x5/0xa [ 337.930951][T12935] ? fault_create_debugfs_attr+0x140/0x140 [ 337.936749][T12935] __alloc_pages_nodemask+0x17a/0x810 [ 337.942099][T12935] ? debug_smp_processor_id+0x2f/0x185 [ 337.947543][T12935] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 337.954291][T12935] ? __kmalloc_node+0x38/0x60 [ 337.958974][T12935] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 337.964783][T12935] alloc_pages_current+0xff/0x200 [ 337.969797][T12935] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 337.975755][T12935] push_pipe+0x2af/0x690 [ 337.979983][T12935] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 337.983175][ T28] audit: type=1800 audit(1592194911.955:556): pid=12929 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16380 res=0 [ 337.985600][T12935] ? aa_file_perm+0x594/0x14d0 [ 337.985619][T12935] ? iov_iter_for_each_range+0x750/0x750 [ 337.985632][T12935] ? debug_smp_processor_id+0x2f/0x185 [ 337.985647][T12935] ? lock_downgrade+0x840/0x840 [ 337.985671][T12935] default_file_splice_read.isra.0+0x1d5/0xa20 [ 337.985693][T12935] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 338.037296][T12935] ? iter_file_splice_write+0xb10/0xb10 [ 338.042847][T12935] ? aa_path_link+0x300/0x300 [ 338.047511][T12935] ? aa_file_perm+0x594/0x14d0 [ 338.052252][T12935] ? debug_smp_processor_id+0x2f/0x185 [ 338.057695][T12935] ? lock_downgrade+0x840/0x840 [ 338.062527][T12935] ? find_held_lock+0x2d/0x110 [ 338.067311][T12935] ? fsnotify+0x7df/0xb50 [ 338.071617][T12935] ? fsnotify_parent+0xbf/0x2d0 [ 338.076463][T12935] ? fsnotify_first_mark+0x200/0x200 [ 338.081739][T12935] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 338.087712][T12935] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 338.093555][T12935] ? security_file_permission+0x8c/0x470 [ 338.099172][T12935] do_splice_to+0x137/0x170 [ 338.103671][T12935] splice_direct_to_actor+0x307/0x980 [ 338.109049][T12935] ? do_splice_from+0x110/0x110 [ 338.113889][T12935] ? do_splice_to+0x170/0x170 [ 338.118549][T12935] do_splice_direct+0x1b4/0x280 [ 338.123452][T12935] ? splice_direct_to_actor+0x980/0x980 [ 338.128981][T12935] do_sendfile+0x555/0xc50 [ 338.133402][T12935] ? do_compat_pwritev64+0x1b0/0x1b0 [ 338.138719][T12935] ? wait_for_completion+0x270/0x270 [ 338.143990][T12935] ? __sb_end_write+0x101/0x1d0 [ 338.148825][T12935] ? vfs_write+0x161/0x5d0 [ 338.153220][T12935] __x64_sys_sendfile64+0x1cc/0x210 [ 338.158394][T12935] ? __ia32_sys_sendfile+0x220/0x220 [ 338.163667][T12935] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 338.169632][T12935] ? do_syscall_64+0x21/0x7d0 [ 338.174296][T12935] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 338.180265][T12935] do_syscall_64+0xf6/0x7d0 [ 338.184761][T12935] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 338.190632][T12935] RIP: 0033:0x45ca69 [ 338.194520][T12935] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.214152][T12935] RSP: 002b:00007f53d3414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 338.222549][T12935] RAX: ffffffffffffffda RBX: 00000000004fcec0 RCX: 000000000045ca69 [ 338.230544][T12935] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 338.238527][T12935] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 04:21:52 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "e2b2a1288c61a7ca7cfe17ffffff7f00000000f4"}, 0x15, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x6, &(0x7f0000000400)={r7, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x9, 0x4, 0x7, r7}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r8, 0x5}, &(0x7f0000000200)=0x8) write$cgroup_subtree(r0, 0x0, 0x4ea00) [ 338.246520][T12935] R10: 000000000000ddf5 R11: 0000000000000246 R12: 0000000000000009 [ 338.254518][T12935] R13: 00000000000008f3 R14: 00000000004cbc4a R15: 00007f53d34156d4 [ 338.384173][T12932] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 338.397089][T12930] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 338.405685][T12931] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:52 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 338.435259][ T28] audit: type=1800 audit(1592194912.605:557): pid=12929 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16380 res=0 [ 338.475360][ T6915] minix_free_inode: bit 1 already cleared [ 338.482701][T12932] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2a8, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:52 executing program 5 (fault-call:19 fault-nth:14): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 338.545994][ T6785] minix_free_inode: bit 1 already cleared 04:21:52 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x82030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 338.588435][ T28] audit: type=1800 audit(1592194912.755:558): pid=12957 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16373 res=0 [ 338.611841][T12953] MINIX-fs: bad superblock or unable to read bitmaps [ 338.625640][T12957] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 338.804791][ T28] audit: type=1800 audit(1592194912.975:559): pid=12970 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16380 res=0 [ 338.815463][T12970] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:53 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:21:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 338.875455][ T28] audit: type=1800 audit(1592194913.045:560): pid=12973 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16383 res=0 [ 338.937939][T12976] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 338.950045][ T6915] minix_free_inode: bit 1 already cleared [ 338.960211][T12973] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:53 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2a8, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:53 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xad010000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:53 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) [ 339.204339][ T6785] minix_free_inode: bit 1 already cleared [ 339.263177][T12987] MINIX-fs: bad superblock or unable to read bitmaps [ 339.297409][T12986] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 339.361176][T12992] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x74, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:53 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:21:53 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 339.517268][T13004] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 339.598738][T13002] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 339.614377][ T6915] minix_free_inode: bit 1 already cleared 04:21:53 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2a8, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:53 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xb6010000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 339.682844][ T6785] minix_free_inode: bit 1 already cleared [ 339.902621][T13009] MINIX-fs: bad superblock or unable to read bitmaps [ 339.968904][T13020] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 339.990584][T13021] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7a, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:54 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 340.096022][ T6915] minix_free_inode: bit 1 already cleared [ 340.108253][T13028] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:54 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x2) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000000)={0x1, 0x1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x3261a) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r2, 0x0, 0x4ea00) 04:21:54 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2d9, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 340.169785][T13030] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 340.202262][T13035] MINIX-fs: bad superblock or unable to read bitmaps [ 340.216985][ T6785] minix_free_inode: bit 1 already cleared 04:21:54 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xcb260000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:54 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x50, r1, 0x1, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev}, @GTPA_VERSION={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_TID={0xc}, @GTPA_FLOW={0x6}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8}]}, 0x50}}, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r1, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x4}, @GTPA_FLOW={0x6, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x40c0000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r2, 0x0, 0x4ea00) 04:21:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 340.424960][T13044] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 340.486162][T13053] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:54 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 340.556275][ T6915] minix_free_inode: bit 1 already cleared [ 340.585680][T13058] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r2, 0x0, 0x4ea00) 04:21:54 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="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"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 340.653553][T13063] MINIX-fs: bad superblock or unable to read bitmaps [ 340.691793][T13066] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:55 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xee0f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:55 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2d9, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 340.878297][ T6785] minix_free_inode: bit 1 already cleared 04:21:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000200)="895cc00342d126732554e5d90f0c9a03b4c90ce59ce911e33aecb8942fa5af6aa981f17da0526938b5214ae85f0d490ff24adce71a4b162deac031aaf2267add619e1a0deba05922dda641f4aeb19dbb9ab1fa3379096566ff416d7b0ab7a8edc38c267d06dda52a04d267426e237181155dcd63cc46d0803baba402a0fd40cc4885ac63aae350c88e93bbbc1cc3a372b9fb59d1099bd7d74cbc1de19e83fa2c6b9974fc22febd6332a7b2c05cba20da08ac6501769e3f723ffd714bb5bac5c3c027c9bd43f20e8eb83238698cf7df7a800989093116b63a59316d2dae", 0xdd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x800) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r2, 0x0, 0x4ea00) [ 341.030083][T13072] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 341.068153][T13089] MINIX-fs: bad superblock or unable to read bitmaps 04:21:55 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xd, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 341.120785][T13094] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 341.156843][ T6915] minix_free_inode: bit 1 already cleared 04:21:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0x3, 0x2}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x87cf85c98bcfb0b3) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0x800) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x141900, 0x0) write$USERIO_CMD_REGISTER(r4, &(0x7f0000000100)={0x0, 0x2}, 0x2) 04:21:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 341.210447][T13102] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 341.249764][T13105] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:55 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76", 0x2d9, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:55 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf0ffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) [ 341.400415][ T6785] minix_free_inode: bit 1 already cleared [ 341.468675][T13115] MINIX-fs: bad superblock or unable to read bitmaps [ 341.481576][T13116] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 341.525396][T13121] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x458, 0x5013, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x49, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1dc}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io(r2, &(0x7f0000000140)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="80009803"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_disconnect(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400204) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000000308010200000000000000000700000106000240080600000c0015800800014000000007"], 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x2000c050) r5 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r5, 0x0, 0x4ea00) [ 341.643715][ T6915] minix_free_inode: bit 1 already cleared [ 341.675735][T13134] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r1, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYRESOCT=r2, @ANYBLOB="3fe686650fbd3be32fc4c864431c547373d3f4af0feb90848ea76980382e1f452bbe0a7a60c06d5026ae78be7f51a5c8361f7d0ca46e1c9ced8f8cab099ef53b4e87655a5c6cd5f27ce8d38173f67d56c583a8adb6c93ec14b1bcfed19de45e0b25f8c0570ee39336c56216805155b49c7e27990f88ea1a44bf1277be767da681ceb", @ANYRESDEC=r0], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e21, @private=0xa010102}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r5 = socket(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0xddf5) 04:21:55 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x10, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:21:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:55 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2f1, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 341.696956][T13138] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 341.753488][ T6785] minix_free_inode: bit 1 already cleared 04:21:55 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf1010000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x4008015, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) [ 341.849218][T13147] MINIX-fs: bad superblock or unable to read bitmaps [ 341.928383][T13146] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 341.942730][T13154] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:56 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e4919", 0x2f1, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 341.973076][ T17] usb 5-1: new high-speed USB device number 2 using dummy_hcd 04:21:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x900, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:56 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1a, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 342.026527][ T6785] minix_free_inode: bit 1 already cleared [ 342.089569][ T6915] minix_free_inode: bit 1 already cleared [ 342.097696][T13164] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 342.212393][ T17] usb 5-1: Using ep0 maxpacket: 16 [ 342.241064][T13174] MINIX-fs: bad superblock or unable to read bitmaps [ 342.270103][ T28] kauditd_printk_skb: 26 callbacks suppressed 04:21:56 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf10f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x7) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0000000048fd576af2bff29ac6ca300308e6d7a43c5d292838aae7bcbd4445008b2931805ad49647290d0bd9", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="000a000040000000ffffffffff0000"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') r3 = socket(0x2b, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 342.270113][ T28] audit: type=1800 audit(1592194916.435:587): pid=13178 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16369 res=0 [ 342.323154][T13173] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 342.333804][ T17] usb 5-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 342.370480][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 342.408456][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 342.420586][ T28] audit: type=1800 audit(1592194916.585:588): pid=13185 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16373 res=0 [ 342.461907][T13178] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 342.472763][T13185] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 342.490818][ T17] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 342.518954][ T17] usb 5-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 342.528482][ T17] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 342.540557][ T17] usb 5-1: config 0 descriptor?? [ 342.541043][ T6785] minix_free_inode: bit 1 already cleared [ 342.573697][ T6915] minix_free_inode: bit 1 already cleared [ 342.601425][ T28] audit: type=1800 audit(1592194916.765:589): pid=13185 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16373 res=0 [ 342.741286][T13197] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 343.058251][ T17] input: HID 0458:5013 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0458:5013.0001/input/input5 [ 343.147224][ T17] input: HID 0458:5013 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0458:5013.0001/input/input6 [ 343.329022][ T17] kye 0003:0458:5013.0001: input,hiddev96,hidraw0: USB HID v0.00 Device [HID 0458:5013] on usb-dummy_hcd.4-1/input0 [ 343.482542][ T17] usb 5-1: USB disconnect, device number 2 04:21:58 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000000)=0x209) 04:21:58 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e4919", 0x2f1, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xa00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:58 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x23, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:21:58 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf2ffff7f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:58 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="f3e0b44ae3d85b2890a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 344.318309][ T28] audit: type=1800 audit(1592194918.486:590): pid=13247 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16373 res=0 [ 344.345287][ T28] audit: type=1800 audit(1592194918.516:592): pid=13252 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16367 res=0 [ 344.367640][T13248] MINIX-fs: bad superblock or unable to read bitmaps [ 344.375639][T13247] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 344.398910][T13252] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 344.413372][ T28] audit: type=1800 audit(1592194918.506:591): pid=13249 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16370 res=0 [ 344.490508][T13249] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 344.504994][T13264] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:58 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf40f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x18000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) write$P9_RWSTAT(r3, &(0x7f0000000080)={0x7, 0x7f, 0x2}, 0x7) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/5) bind$phonet(r1, &(0x7f0000000040)={0x23, 0x6, 0x5, 0x43}, 0x10) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) write$cgroup_subtree(r1, 0x0, 0x4ea00) 04:21:58 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c777", 0x2fd, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 344.663807][ T28] audit: type=1800 audit(1592194918.656:593): pid=13247 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16373 res=0 [ 344.697681][T13270] MINIX-fs: bad superblock or unable to read bitmaps 04:21:58 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x48, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 344.741744][ T6785] minix_free_inode: bit 1 already cleared [ 344.785076][ T6915] minix_free_inode: bit 1 already cleared [ 344.868376][ T28] audit: type=1800 audit(1592194918.996:594): pid=13273 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16374 res=0 [ 344.873810][T13275] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xd00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 344.940722][ T28] audit: type=1800 audit(1592194919.076:595): pid=13281 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16378 res=0 [ 345.006676][ T28] audit: type=1800 audit(1592194919.176:596): pid=13286 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16367 res=0 [ 345.157339][T13290] MINIX-fs: bad superblock or unable to read bitmaps [ 345.172499][T13287] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 345.194206][T13286] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:59 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:21:59 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 345.259192][ T6785] minix_free_inode: bit 1 already cleared 04:21:59 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES32, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRESHEX, @ANYBLOB="82003e9a32842c2498a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4000010}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e25, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:21:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1020, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:59 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4c, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 345.369168][ T6915] minix_free_inode: bit 1 already cleared [ 345.441068][T13310] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 345.461887][T13304] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:59 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 345.505282][T13315] MINIX-fs: bad superblock or unable to read bitmaps [ 345.554786][ T6785] minix_free_inode: bit 1 already cleared [ 345.619203][T13322] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 345.632102][T13320] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:21:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:21:59 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) 04:21:59 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf7030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:21:59 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x60, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 345.745398][T13331] MINIX-fs: bad superblock or unable to read bitmaps [ 345.769198][T13334] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 345.790887][ T6915] minix_free_inode: bit 1 already cleared 04:22:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000000)) write$cgroup_subtree(r1, 0x0, 0x4ea00) 04:22:00 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x303, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 345.908949][T13343] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 345.965963][ T6785] minix_free_inode: bit 1 already cleared [ 345.996140][T13350] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:00 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$FIONCLEX(r1, 0x5450) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x4ea00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0xffffff0f, 0x70bd29, 0x1000, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x4}}}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "8c054bcfb113b200"/19}]}, 0x48}}, 0x1) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000140), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x4, 0x70bd25, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}}, 0x20000000) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f0000000200)={0x191, 0x8, &(0x7f0000000400)="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"}) [ 346.053146][T13354] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 346.113271][T13362] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 346.179520][ T6915] minix_free_inode: bit 1 already cleared [ 346.185288][T13364] MINIX-fs: bad superblock or unable to read bitmaps 04:22:00 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x7) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x2) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff58b3c45b70a0c2a5f12f4ae571d0fb40ec9518ba2a0fe41bf292dfaa30f40bd1cf25daf5e65f69696cb5e29b2269f8f191f0be5192b8614dbd32cc303e9151977362cb93"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:00 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x68, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:00 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf70f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:00 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x303, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2010, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 346.260570][ T6785] minix_free_inode: bit 1 already cleared 04:22:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYRESOCT=r1, @ANYRESHEX, @ANYRES64, @ANYRESOCT=r2, @ANYRESOCT=r0, @ANYRES64=r3, @ANYRES64=r1, @ANYRESOCT=r0], 0x32600) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x301040, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000080)=0x2, 0x4) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r1, 0x0, 0x4ea00) [ 346.398372][T13375] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 346.485373][T13388] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 346.533834][T13387] MINIX-fs: bad superblock or unable to read bitmaps [ 346.566954][T13395] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:00 executing program 4: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x82030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:00 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:00 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf8030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:00 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb", 0x303, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2300, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 346.658531][ T6915] minix_free_inode: bit 1 already cleared [ 346.706397][ T6785] minix_free_inode: bit 1 already cleared [ 346.806787][T13407] MINIX-fs: bad superblock or unable to read bitmaps [ 346.827115][T13415] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 346.838660][T13410] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 346.854509][T13404] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 346.865260][T13412] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:01 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x306, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 346.964521][ T6785] minix_free_inode: bit 1 already cleared [ 347.041826][T13425] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 347.097328][ T6915] minix_free_inode: bit 1 already cleared [ 347.192877][T13431] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:01 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \r\x00@', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657478305f746fa617af726400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300260e5405215b3e48075be262f6b04349f72fad306a0132be39281054eb20e0", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c249080406cd79b0505a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:01 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x74, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {0x0, 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:01 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf8ffff7f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:01 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x306, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 347.280891][ T6785] minix_free_inode: bit 1 already cleared [ 347.385355][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 347.385368][ T28] audit: type=1800 audit(1592194921.556:617): pid=13450 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16377 res=0 [ 347.415403][T13442] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 347.419731][ T28] audit: type=1800 audit(1592194921.566:618): pid=13447 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16382 res=0 [ 347.439846][T13447] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 347.449236][ T28] audit: type=1800 audit(1592194921.586:619): pid=13449 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16383 res=0 [ 347.461619][T13442] minix_free_inode: bit 1 already cleared [ 347.477063][T13450] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 347.489243][T13449] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 347.499345][T13454] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000535d25a80648c63940d0424fc60100002400a000200051a82c137153e670402098003001700d1bd", 0x33fe0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000003340)=@buf) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x42000, 0x0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000003240)) clock_gettime(0x0, &(0x7f0000003080)) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r2, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000003100)='/dev/nvme-fabrics\x00', 0x3432a0, 0x0) [ 347.586673][ T28] audit: type=1800 audit(1592194921.626:620): pid=13452 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16384 res=0 [ 347.607981][ T7173] minix_free_inode: bit 1 already cleared 04:22:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:01 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c03", 0x306, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:01 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7a, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 347.714403][ T28] audit: type=1800 audit(1592194921.886:621): pid=13447 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16382 res=0 [ 347.741764][ T6785] minix_free_inode: bit 1 already cleared [ 347.751205][T13467] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 347.768784][ T6915] minix_free_inode: bit 1 already cleared [ 347.806102][T13472] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 347.829982][T13472] openvswitch: netlink: ufid size 512 bytes exceeds the range (1, 16) [ 347.839216][T13472] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 347.859607][T13471] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 347.887872][ T28] audit: type=1800 audit(1592194922.056:622): pid=13478 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16378 res=0 [ 347.890652][T13472] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 04:22:02 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf9030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 347.952548][T13471] minix_free_inode: bit 1 already cleared [ 347.977254][ T28] audit: type=1800 audit(1592194922.146:623): pid=13484 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16375 res=0 [ 347.999816][T13478] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 348.029793][T13484] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:02 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 348.051490][T13472] openvswitch: netlink: ufid size 512 bytes exceeds the range (1, 16) [ 348.103248][ T6785] minix_free_inode: bit 1 already cleared [ 348.112806][T13472] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 348.134018][ T28] audit: type=1800 audit(1592194922.306:624): pid=13492 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15953 res=0 [ 348.151927][T13492] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 348.162387][ T6915] minix_free_inode: bit 1 already cleared [ 348.230574][ T28] audit: type=1800 audit(1592194922.396:625): pid=13498 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16366 res=0 04:22:02 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002500)=ANY=[@ANYRESOCT=r1, @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="008cab45aa9816acd80d5036aa6aa65ab3ae5fc220f5b865832f782ddba536c4da85572ff1fd96d8f144344e04983a83e59bc0671cde006bd0ecf3f6715ce1a45beeea60594e4c4b2b166d968dc26b26c568cc763d417a702bcf40a50a78a9dba6af1b5c7a4f286bbc03df87274d87f71338dd272ce803a6ba6c927cdb22d962da4b5512819017ba0ff4628cf87ca17ff0cbe35f50b725b648299758094391c038584090d769ecb6821b58a2c315fe155f6bb6f4fdb3202fa8b02524a03b70258be67398c8448aa4ccfc4c9888349b65ff7a64c768bcb3fb45df92d82f5d7058e0b47952e567ae4524ecd53eb49e7c39baa06caf7adc7d745aaed3990f3722ad3f2c64cacb5da6016d695209017c9e0271cd6c19a300d5ef1351355b0d3d05f0039e01bce86001f0522b1698725415a0da22ec9aeae50eb53746db1124520d3a9f6f06db3a4c4b182105274f5d285759c9bcdc12b786c255904e11e7d1dbd88b5e1e0c2886f5fde3cdef4ba22957f4e34be7c39b94a932faa88ec1a7985857e69f485a6a289994c47b6c430c9ee00fa07d9fd6e26c3a4692150285a4d1b2704aa5b5fbeec6178ef57111bd8fe490908e163a6cc9c09e33c04b24d1d52e7a3da1dab96d8f12877cf9e17a5b53f1314696a0a882a54619e6c924bdd26041169376890d38638bd248a9c66daa4419582367cddd8f7e30d3519520a2d10148bfdd27b1e7656da060630c8443ec997c845b34741ef31789d4e7b1711deab827d7e6f258e43107715ffdad250a1e9c1b22d4c23aa853ff69fcc6b49d808cc9f4cbdbb33230e96e9d0d8b86e2a4562611dbf0ba5efc62c87d36cdc78adcdace54da5457e6740186aace339a63e084bc5277358c3abee12d1e3e5a8012461d27475f1bce69a316b5982b81233fdcdcc540d2dc3c825faf7748280565b16e62b46980846a8e68003031b88672a9839813673cd936b3712b382f4188b9c4b2b6c7078e6b363e3196e619e809efc32aabf923b67151d9b7e19978152d366574f63776ca9420e2f6ba04355ed3f6bd874acadce39683426d6c891bb18991d25dc5b487ab195bc00d6d66e81d89d3b17945951746d53d9367dc6321c08f0cbcaa678cd4eca9e61be8b6bc5b1379b4adbdb573edc33ce56dbdac9ac4255a438cb8e34efa8c7bb477b3fb38671841eaa073bf4067700596539fe0644b1a81e534b63d655e33882fe6c3c72e2623383a30dce6db4bf2ddc525528ea58780be46ec983b92f95868392b3b7aca8d1f2fadac28de907c5cfff6f0563e019aa7e0b96a1aee01174d0d7bac893be9c39440276bd8bdc0dcc0da4d276a7bb8b7f30e16c0bb6b69ef40c83754bf99b22d2d2455a91054df1ffb72b71e01cd2b904be3b27e84d144517a9d1099342109330ddaa9a3a9809418856a11c0b9d9273e7cf0e8f8432b1b7c4d2e3b383d5b33a0a9a6fba28fedaa44183930962cd72d051bddd4f8834f730f55e8b0f700f7efea9dba718618fd59be1b824a8e9e8dfdd542dc9d717f1df78a8039c6f3a520386c0dce20b136fcfca71df3489206322b0cb8ad628d727507004598b67eb90c80c4ae270628204fb9eab967fc4ddada50020ed5aa581b940eb332e535a9565a0004852ee4510b3556b4ce1ba2e27e3ae4c753d3cc2e39f1d25c58103127dac5db0e252ec35ec041ffdd07086b780f52b820915bca0346a7119a3018c0c228f12586ea8e71f64577bde125cc02f636ecb7f088ad379cc7389c3e3ac9db5a35b66656126f238f5a4a11172db71f6f49ac6a3238728b17055ee9159cf0f87ac0ea0adfc4ee9a6c905793585683e1ac64758b7428636bad5857f438af4f77622d13f0160f0ba1ffa47c722a80a6c267d99a6f0518d420e57d507423523c644149a2c25ba8389a25bc4afadb20037b33602e3be9f69ea17e76ea83a8c079b455ff6d1a49958c5fdcd2078d4ed6822b1e5a1c2d4153bae4b090ad24a6949f83e5049636637cc282670d8f81d1ef1752f256f01e255ec8ba9c34592fe32f839256ddb7a1fc083e7440ed79594361ee63d0073e10f6900a627a9b26a0326637ef2f3f3d79db59cb8ca6ea21f20477f63e1250cd79a644317b0a31d77116495ef83d70017ad71f365a607b57b4f83d30ba329936500e37cbd93e7d5c625f25a963a9aa336ffe725fde63d5c63aaaefea1763f578a1fdeddaaf55d7fa46d3208ed8a14616a3b8997e0c7c023876f0aa676d782f58a33cfac18925d1e9ceecc7903ff689e3ce7cdfc277c9651168f98e64fc1e1a70e13f4c9130dd50d7c748095c3cb98f93cee590f141316c212f9be1f00fe12d2d7236276a85e22b4617e236867a2c154907cafbc541fcaee96c3f28de2e2172026b7840193402850519020bb60bf8138e5d2bf37f7af19831004cd77815998909c35aaa6bcce6b5f57a9edb186c1ddd8803bf1d963383ca5510599a6385c90a903f87b00324a73bf8d424eaada0956c50d2fed42882863f888c3f31ec40767855c8cdabec6493524eb30c086f5795f77445763cfb299a7f7d3a6a68902172fb6353015a3d63240ae7616bc3afac40551bfe8c8c5ed1f5cd94db6ba022840f8dfd072c66d01ad4b49e76b0ba86c1a22f95afb6ab1d50e470e301fba3e70088a3f31506ef6ad97d274f2705e987debc08244fa62de6fdc134e3301dcceb08a02e1b08f748fb9f9988605adeea59523cf41d438242c86a2a5e9e709888f8ed53c7844e209f1baabe4c220dbe7c8d2077c4355e14b0da3ef04d80e03a0687ea6b274f7753ca95fef1db1bd9c1c58bcd1406a35259e60a479eee434350210736c7390ac957790147c331eefba5f91e48895f40f4bc4a336b3136bdc9c43c3da0f6858b7531c68fc4b7e06f6bbbc2c4431e2d1a52d10c1f2d510dab9115fa6c405fd3076bd5809e75c5c11fafa0a157c061af743eadcce6e44d46fdecd86101c2fd0ecec243be076902cc3eab25ca9860f51107d52762c130962b6996b4e175b85bd97fa3e781855bce41d24326a50790aabc12f28865cdcdaf4362f916ef01ebd434aa223d80dd3cd5bc7bb750aba58c4fb7d1d3a1755578a1d2fe51054658d2829498593e43ccee3c132c8b3828c8ef773695002de216e510d0b51c9b2378ac3ae7a574aaa6e1b88fc814c9e996424079fff53408440bc66a120bb7bbb1d56cfb4179da79c46cec73e505257ad69b344b1041d5c51cbbfef5ac9d2e2483273fba8bcbb834d57f36f13650bfd47a4735b384e3b769b140805de8e0bb4233d75dcc27f174fc3dd805e34687496d2d67891ee7d6c7886cb322401bd2794a032620caf1effcefb1f08e1f451b21d68601962f4de0cc976c418da88a587edc120a0fd94ad9d58013c65582e4df759f24390ab0d01ef5e0e2ab20db4b7b3dabb7c7798c0e10144dc6c8f2d896a4cebdc59c4140ef3336ae9c52d2096a98e657732fb51a4cbefd3a7290292c3f48af0b8b07fa0118444e055b94b05e1f14282f1f2951926b4c9bef98bc940d60f7ba06230234b45f374ba191a4a3ec73f83196d49fe36e9508ed7c04e3a54ecb6ce9a2140411611885fb1c422e964b12569dae73c4effbd05f6175e0c7794b18b95caab2a49f03efe9df690e14708372178ac55b64b25c02fc3681feaf315c78c2a281cd01ec636f7a4a5b068577f3268ad86a75632ec329b12e408ab377542e177773684cb07f0ae6ab47231c22c5dd0edf5d1326f81cbac311932631f86e17f51440a055283df39cabe1a04018622d76f4700c6499ddb83bf4767f5871e2fbfb1cdf02772828014dbde134aa1638d5827d30be88994f0eb276f5b605549f4815bdb0f0d424c62222e560fba2265495d6fd91804463d481bc2bd08bb762f231633bce36afd40da55ed401bd656bd7705a0daa070ed6695e8274cc7fcd795f682a49dc3b61ee9a4068a962d17c85774d1c712ffae687a6f972c33ee8306baa789d8ec676633b2690d08d448cc6d84900345580225edf86a96394864ac6a438973b0020089cdeb25237047b8cc51a4467307d53573afc2edd49f40ec7f3f85cf94b04ae06a9af3f04fe764afc89a824f25d3cfb9ba8063b4bc21a81c65a0e59159ce35aa549da7dff722dc3d4a78ee14fd3374818fd21502e6799e8baa5245fea77e422d8968280b47fc4612aa1988cb47545200523421a17fd3d6ed2c3ca5b53f659043255b7e72fda49e33644addef7c6f1cfbbffad6fa0f7a3f92650250b340b7621ca8af533f3779c0e7cac93ad6e6e0ff295af3ce21db9ab9acab03e027c3e17d346484ec69c9531101e51d7e3f74e82bc0cf07b3b583ea21cf3fba8c4bffc28fd37f5e79fea48781fd2998f8bbfa0ccaeefc7f5a6732cc0260020d33941bb3b798257133ebef405262aedb31731c9d1d5c0eb0a73ba3fb3085f3113e5b051d29158689b15b4d866363d5e3e0ab397f97873f6a47f9f6674561275d4c1dd4e07ef9f3aacf6252b2b289636de8070a0623fbf58a5dc7935f32c72060307a3f1550549056191ca79c3a06d31994ae9c2e259850659ab31e2c04f14a1f6c7a42ce8ae6cb6a34c00c344608bf488a76933546c2a2a7172aa416e70142fb2c5d40c069225e43da00b4bd9433a3fb35382287b82856468ad6ee7ed1b66ee8e8ea88a4d126abdd73d2fda9ae045e0e81385fa6ed65be0975d78138ae71572f01ff8b5ff729131b79d5d3e9e9dbf1a503e9bbc8ea8429bc9685b161903d6358bc0eefa6f025ec3d59b04472d7d8c6cf843934e65428758c071c132c085f3a44d1b427ba50d36ae854bdc64a28584e4a861022281cc77e00e958778174e66a908b6a8425d70dbae1c35502daa001debbfd4f533ce2a4e7ec15559bab176ef3a6f76bb71c16adb9d0af8137eb17ff18d4a6b372045ac3f46333fdbbe878a93668d9396ee71e90235465eaaa82dbcd8bdc5e824e027835772f2ee0f1a440bbb994e9e444d8dfab504a771e4d7044217a31101990b541f9046346b08a53393e95e9e9dca674a531808e41d2c334918bdff7b4303eeaa5335acd8ef3a6c496da30f3b3c0adffea12b13c7c738c2f6c12bc351e8e5ea85bb713ea057950037c5eee426844911de593337cebcdff82495b069e2f92ffeed04b19aa5f255b0e2f82dca6f7482aa21ac8ad61f5d06f242ded6ca88456ac438b2feb2e9de897f8096802da9685e2a20b9c15f7ff9dd0097eae7f634c75774f04d38d1558f611053ab20f024009030ad518161bd7f495fe0dc64a352a03f8d478156e611c538c78710b10572fbbc09b29e15da5be81741f4c5e8d271412a8f66e4dfa7b5e5c51ffe4032ac7ea3372ccfc7be046917193b43da419919bf3fa68c4c525be121a7d80477481aaab5f3ee119d24f2d7ffe4cb45a1c483a88760adc0d05a72b41600ec825dbab3c71f6feb9d1609d8f9d8b37fcdd4612cb7a5705e4b28cb9d867209a6320bf1de8825f4ec7daa9faedeaca26f447104a137a9adc59364bd9be53da4cd138b833ef88b837d1057c189d7d5cdf09028d816ddf56ff0817d8c2234977091d95851c7ea81fb6a36c9e3b550471c281c3fb0d16c4425ecd362548ac7db0ff6036e1f72b723c1c6764e100d6d5ad78f8edf171834b74ff57334aa42d27eb10ae4d381b1be941ce59a7e30dc31ed29db4d0cf45a66751e3dd5297e246fe3602f8f5b6ef089198387004293fcdc05126f1f1c2bf18174d706561d467f59c3d2cbb13315b010d530001167ea5d54f5a05858f5049385e1d6389b50e45831b2bd6c55d90752163e76d296c306a0d0"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8040) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) 04:22:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4800, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:02 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20, 0x0, 0x8, {0x7, 0x4, 0x3}}, 0x20) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x3f}, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r5, 0x100, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCSREP(r7, 0x40084503, &(0x7f00000000c0)=[0xffff, 0x3]) r8 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x4009fe) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 348.312708][ T28] audit: type=1800 audit(1592194922.486:626): pid=13492 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15953 res=0 [ 348.335810][T13498] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 348.376262][T13506] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:02 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc", 0x308, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:02 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xf9ffff7f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 348.457871][T13512] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 348.469688][ T6785] minix_free_inode: bit 1 already cleared [ 348.477438][T13514] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 348.512606][T13514] minix_free_inode: bit 1 already cleared 04:22:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 348.658131][T13524] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 348.693342][T13527] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:02 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 348.759693][ T6915] minix_free_inode: bit 1 already cleared 04:22:02 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 348.825226][ T6785] minix_free_inode: bit 1 already cleared [ 348.860738][T13535] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 348.869701][T13535] minix_free_inode: bit 1 already cleared [ 348.876808][T13537] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 348.943029][T13545] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:03 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfa030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:03 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0xd) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000040)=""/2, 0x2) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3e, 0x3e, 0x2, [@datasec={0xb, 0x4, 0x0, 0xf, 0x2, [{0x3, 0x6, 0x7}, {0x2, 0x1, 0x80000000}, {0x4, 0x9, 0x34c}, {0x5, 0x9}], "6d8d"}]}}, 0x0, 0x5a}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0x3, &(0x7f0000000200)=ANY=[@ANYRESOCT=r4], &(0x7f00000000c0)='GPL\x00', 0x8, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2d, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xb, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85ebffff10000000840000000000000095000000"], &(0x7f0000000180)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10, r4}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = creat(&(0x7f0000000280)='./file0\x00', 0xe4) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000100)={r8, 0x20}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000180)={r8, 0x3}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000001c0)={r8, 0x1}) ioctl$VIDIOC_DECODER_CMD(r6, 0xc0485660, &(0x7f0000000080)={0x1, 0x1, @raw_data=[0x8, 0x6, 0x1, 0x5, 0x80, 0x8, 0x3, 0x80000001, 0x1800, 0x8, 0x9, 0x5, 0x5a, 0x6, 0x5, 0x3]}) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000840)=ANY=[@ANYBLOB="d0000000", @ANYRES64=r6, @ANYBLOB="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"], 0xd0}, 0x1, 0x0, 0x0, 0x4000010}, 0x85) [ 349.136801][T13549] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 349.182656][ T6915] minix_free_inode: bit 1 already cleared [ 349.191550][T13558] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:03 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) r1 = memfd_create(0x0, 0x0) lseek(r1, 0x0, 0x2) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) 04:22:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000019280)={0x2, 0x4e66, @multicast1}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000060601080000fdff0000000000000000549e15"], 0x14}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "8d6dd36a5b633a767333d453c6ed9b4dd286c20df2cac4cd2edb7808d9a760572156b57185ad3412a84d8247775cb1b148f3c3a6e0677a45c79b6b3538d269b50d1fad801556"}, 0x4a) connect$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x222000, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r5) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe0, 0x0) recvfrom$inet(r7, &(0x7f0000000280)=""/102400, 0x19000, 0x14040, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) setsockopt$inet_mreqsrc(r2, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) 04:22:03 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:03 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 349.224498][ T6785] minix_free_inode: bit 1 already cleared [ 349.235077][T13562] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 349.254992][T13562] minix_free_inode: bit 1 already cleared 04:22:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000ec0)=ANY=[@ANYBLOB="b400000000000000650000000000000063aa00ff000000009500000000000000a9ca14fbdfa21034b40009a7ba08c71ee96f33a30eee06906608108665bd418f7609ac25c2227796debab1e0bed11068c418c52efb67803687cd98564e2c3658ca29e6afebc5302a7acbcc1258573b607f38c5e9996593ebb2d69a0cadd1b3c846531d689a3646"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000e80)) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @private0}, &(0x7f00000000c0)=0x1c) sendmmsg(r2, &(0x7f0000000dc0)=[{{&(0x7f0000000100)=@hci={0x1f, 0xffffffffffffffff, 0x2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)="b376316ebbbf7253337b66ff57dee9bcdd80ef30f808e1281136abb799999f412a9a705ab3b1531ef5cfb95ad78e8f95151289a9c7fd83dfa4ab3b4bc17b16f8ff340dbdaddb5b9294dc7da86030426a7615f9b0a8b45e979df50d4dee0b557ea4ed24c0e4940a1afe6fe7b1dd120bd27ed5902fdce8d16e851868e20c3590a99a1bb8c65345e16f01b53b38b0c5dceba1e4a30f77729b680116e3036d5ce5567afd43b45ae2db5e5752e6d0dc830621c304b00e508efe7ff62eee5f11e2e3b68de82c9366bfe178fb0e24eca9b37b54ed7ff486d8bd446c107ecd72bbba52ce74dea7df926ea0e41f9330c394569af7ea", 0xf1}, {&(0x7f0000000280)="b4bb3dd11bfdeeef7d3c7a1481b8e3fdc705905ec75a2915c081afd7edc24642a33ebe6c457fc0eba32207c211dc619785d6e4309afce9870da4554a5f7c599c769d145d4436a4942387062c9965fee7d9adf573806db535", 0x58}, {&(0x7f0000000300)="ee188ce64c809ceb820a12a0e4a470a0bf0aad2b6f2a0441877b6a55dfb2bf7a2bf0b21df063766955a5d8e07ca258806964fc6109541425cca37cf380ff05dea154f47a8c046798c950d987c3181516a9679df259f565a2d69f0437ba6115a31f7256fbd61ac35daeab000b85ec2f29c22458c6b7656792fa33968a584c7cc45cb8b2bcd97d6cdc60a1b2", 0x8b}, {&(0x7f00000003c0)="b49ad5133e1b5b422fd45b4d4e098a1b64c377954b9859a2490f5ec51675be3a6ceadb28f9a613a0734cf7bf1fa1a1f92b69a5e402bff3d22efee8cdae947eceb159f18628b1b7f731d6a6a0eb333691615c12703028d1e3edbb1721cfaee5a9d228533c55c0f273f9325b274059eb258450f7df10976ca3992048a6fcd3b48de1f848cb987b1645887d139340be577e3d0fe2eaa41d8622db575f7d4b23afb7404f1041023cc6b861fa48fa50132c3e1e6f7868990a1fb72f6fb86080fa9ce03047481869ee2a34b9c62f6646e7d4b2236a954e55c2b23e896fbdd40eece9977321", 0xe2}], 0x4, &(0x7f0000000500)=[{0x100, 0x105, 0x3, "9221bfd25c40118c0aab4801fbe9d2c2081258affd9d56cc50f0084462b796688a3f99f0501082d0b5240a33b29f35da669e6be43a99fca7a931488e54f305d5cf1c50a1681026397a5f54c5f3cd448e4aaca7be9364f645cc8f726bf94c7c073a8804276665cf914a65d2bbc6341cf6cae8fb54fcdb988f859f2b8d331fbd9e62e54d3cd5f439bdb97889912381696eaba73327e5a156da10e1588c8e25bcbf57b0fd5e8690044554711a4f734fb23c13850020be4b3ca35c070bf15b67d231540d8bae8d9b9fb264cdbe3f7f9ee437b3444a09de6781e4ccaca2f02515b6feab6c1e5fd4feb66ec6203bd042"}, {0x90, 0x100, 0xfc9, "10eb272aee9ea8129e1128ba394ba11c583aa413410b46128a24cfbe4966a02f77ec7eef69d1c7e6b3aca478295a33e9b9591de97bae7ea1e9018e426a773658fba937ea5996f00abedd3b3570166b07dff48e5f79f204f9de74fa2fc78ca10c5a885c7d25910a0e0960704f3d73b2a8f0131d5f695fbbd55e176681c012c0"}, {0x10, 0x3a, 0x8}, {0xb8, 0x119, 0x2, "a8ddf70b4dc175367c08da30067048b1c422639a154d182aa49529080fca263b23a48a71b1a183873848fc772b17bb3ba685439d70977151e61d2091181f2dc10a4c7c047c61c7034d8d13ac9728e57fd98a0abb033c2a1975d3247eecf549edf9ca44dfa4b4e9f85014fbf64434ce11005ea9c95434cd1a6001e7c80ede8e364bdaa5dff723df146581f1ac9b64528bb83f7f2ab68bf3bedadd019510e8d86c788b4901"}, {0x18, 0x88, 0x898, "be2dd1e8"}], 0x270}}, {{&(0x7f0000000780)=@nfc_llcp={0x27, 0x0, 0x0, 0x6, 0x3, 0xff, "cb3bb50cbbd137e90e56712f3f2ea362be07fdc61b8d63bbec53cbb4c8f39e55c6ae27e9527636cb5273bf40aa25d6c6729a2b9c3ddd6c212352e4a97ead14", 0x22}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000800)="16f5536d1042d3e07c21ea61b97b7ac372b72adf1375d907e957c9936249e7def0579d4f2c99c4944cea75a2bfbca5524d7fa9af6251b936bc3d0a478b35284c67e94735b1ef2b21cc704fe306d778846fa9b922f4dc033a7afd95696d1194a71ec33d", 0x63}, {&(0x7f0000000880)="75f31856045defd4003af5097c2eb36aa5b07ab417e5bf6adae4f070f0f3c475bf695a3fbea9ae37010ded237637b6206f04c9cc006a7e4fca5a26ca90027fb45e79b31b3dab2711913cfaa6c37b03a923a9165e6d023f713c7826fa02931e9fe89af9fe725c01aed68c45da000715560f627f27214f771d140a3c46624694885654f0916088ce32758a5e18d79b2f94a4aecf9bb3a8e54b15b2b25d9c83a6f2d0e8584de8568f940d29e03c865d7c19a24330b9959d0aaa8e9723db16e6b4718c4089a96989b22368f1", 0xca}], 0x2, &(0x7f00000009c0)=[{0xc0, 0x118, 0x1000000, "49fb2a77b4fc23c6efb2c4173b4efc7ed9108a4de24aff0756c6619a58f2d0fdb3a714342ad395608a72c3f90c9584cccf4ea307dae1c73cc7d9367695750e01c145428680ab1431a9fe08c7c47ce8505abd7b7bacf7009fd9df2e633d96a381ee07b86756dc6a0a6854dec8f7aeb21edc5b84735957b48278dab40305ba069fc887d44ca2732789380e9850199da4c3c731667a2d4aa992a674d600076de9874205d0240216442125f52385"}], 0xc0}}, {{&(0x7f0000000a80)=@phonet={0x23, 0x0, 0x3f, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000b00)="0ae1adaff0cad030bfcbaab85eceaaff69b047722d85f5141f20409deb7e581f6a2abf3a20a00a4b47f958f7fd5a4cebcf", 0x31}, {&(0x7f0000000b40)="1fb329db1fa0550597283159d466bf50265601665f92705b1091f379d88b10eb4d4c4c684751c01b5f94cf64f75d251ddf8477b0c353d36c946f6bd2f3479fad9d49e23c565c567c63bc27ebf33474a65b88b14fd836521b614e41eef1e8d1644bede6095053f9a534b74405b02c9b23226b492f1169140e28f0", 0x7a}, {&(0x7f0000000bc0)="5b33dfa58465ea48350843593ca098f6a323cca79bcede11f3d9ba4195d20402ff0d18d703ec267e0f847888b438215a3ea20913ede63380ae3f6ef774667c08da238648ebf1f68d048414ea637d9ffdf3e98d4473c8e3916172c020fbd572ac0e8ad05806283e32fe3de63185c9ac93874f300d2684677121ce162a305959268080ce9da0c72b9bbe166c0139a0ae31633e91cf10458a64edd2ca8ff54108f504fb64fef5f1b40f44de860ec3ee8ffc7f7de0d4a69a34bfd6e6ce4440d056c17376c761103d0c4dcdfd6204b74a82b8a8b92ced27f34bc50980", 0xda}, {&(0x7f0000000cc0)="6cb7e5d1bf9f0b850ad79e10f4ff645c79", 0x11}], 0x4, &(0x7f0000000d40)=[{0x58, 0x113, 0x8, "91e7fb2ca379e8cde387043a11c2cf04cceaaef1946a18475ff7debad513a8e0a772d86a5f9380d144748701db7c86d75884ae143fc2d60cb4eafaf7d4d3452fb3"}], 0x58}}], 0x3, 0x40000) [ 349.367305][T13576] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6800, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:03 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfa0f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 349.469524][T13583] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 349.480406][T13582] MINIX-fs: bad superblock or unable to read bitmaps 04:22:03 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:03 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:03 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x212801, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000240)={@bcast, @default, @bcast, 0x8, 0x5, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000140)={0x1e, 0xb, 0x5}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = inotify_init() read$eventfd(r3, 0x0, 0x0) [ 349.646501][T13597] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 349.677451][ T6915] minix_free_inode: bit 1 already cleared [ 349.697902][T13597] minix_free_inode: bit 1 already cleared [ 349.719865][T13601] MINIX-fs: bad superblock or unable to read bitmaps [ 349.734434][T13598] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:04 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 349.961943][T13617] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 350.064085][T13620] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 350.198856][T13626] MINIX-fs: bad superblock or unable to read bitmaps [ 350.216289][T13627] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 350.225321][ T6915] minix_free_inode: bit 1 already cleared [ 350.242235][T13627] minix_free_inode: bit 1 already cleared 04:22:04 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfb030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:04 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x900, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:04 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(0x0, 0x5) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf2507000000140004df75657468305f746f5f626f6e6400000008000500000000000ce342f97c0000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300f0d65e5685c7e45dc8ed135d0d1f2ecd2a4a8eb20da6f4f4fc7aeaa21de6bd4807d2c396493569a86f2eb14e562208ff961de4843a1f5ba6743a966141d828a000853201c7a8d6b953bd6688a5293c862cd071a87f7c6e61df396bf2697b1f772e83cbc26633517ad47808e1bf4fc8b29c0939bca6eedf87f2966716fc0f23bcefda1e70d8ca8cc05641e2f69cb18ef3fbef29a125760e51bfebc9b5379a36b0e6ea8972beb93516551019c597849e095047d69af64926c35afd57ee622455000000", @ANYRES32=0x0, @ANYBLOB="0c003e00dcd89236dd8a409a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(r0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x18b7) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:04 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 350.476914][T13638] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7400, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 350.625235][T13644] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:04 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 350.701948][T13641] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:04 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xa00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:05 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfc030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 350.814388][ T6915] minix_free_inode: bit 1 already cleared [ 350.944413][T13660] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:05 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 351.082208][T13660] minix_free_inode: bit 1 already cleared [ 351.221272][T13669] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 351.234646][T13671] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 351.346190][ T6915] minix_free_inode: bit 1 already cleared [ 351.423189][T13684] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:06 executing program 4: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfc030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:06 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:06 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:06 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdadf25070000001400040076657468305f0a229c03e431b2746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077670000080001000200000008000300"/101, @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:06 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfd030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 352.897516][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 352.897526][ T28] audit: type=1800 audit(1592194927.057:651): pid=13701 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16370 res=0 [ 352.934519][T13704] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 352.945724][T13703] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 352.958286][T13702] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 352.974671][T13704] minix_free_inode: bit 1 already cleared [ 352.997987][ T28] audit: type=1800 audit(1592194927.067:652): pid=13703 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16369 res=0 [ 353.019549][ T28] audit: type=1800 audit(1592194927.097:653): pid=13702 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16366 res=0 [ 353.049960][ T28] audit: type=1800 audit(1592194927.127:654): pid=13709 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16365 res=0 [ 353.156668][T13709] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 353.180759][ T28] audit: type=1800 audit(1592194927.337:655): pid=13703 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16369 res=0 04:22:07 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:07 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xd00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 353.274118][T13719] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:07 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfe030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 353.325825][ T6915] minix_free_inode: bit 1 already cleared [ 353.396112][ T28] audit: type=1800 audit(1592194927.557:656): pid=13724 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16368 res=0 [ 353.537438][ T28] audit: type=1800 audit(1592194927.697:657): pid=13735 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16375 res=0 [ 353.577930][T13727] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 353.586852][T13735] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:07 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 353.615732][ T28] audit: type=1800 audit(1592194927.777:658): pid=13735 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16375 res=0 [ 353.651673][T13727] minix_free_inode: bit 1 already cleared 04:22:07 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfeffff7f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xff00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:07 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4\x9c\v\xbf\xd1\x8f\x1dL\xbe\x00\x00\x00\x00\x00\x00', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1966f48c", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 353.738249][ T28] audit: type=1800 audit(1592194927.837:659): pid=13740 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16083 res=0 [ 353.757657][T13740] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 353.819453][ T28] audit: type=1800 audit(1592194927.877:660): pid=13743 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16368 res=0 [ 353.943195][T13743] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x400000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x80000001, 0xa, 0x4, 0x0, 0x5e6, {}, {0x4, 0xc, 0x9, 0x81, 0xc1, 0xfe, "fa4c4d15"}, 0x2, 0x3, @userptr=0x40, 0x2ff7, 0x0, r4}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r6, 0x2283, &(0x7f00000000c0)=0x60) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'nat\x00', 0x0, 0x0, 0xd4, [], 0x0, 0x0, &(0x7f00000003c0)=""/212}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000004c0)={[0xeffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x1, 0xffffffffffffffff]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 354.009897][T13756] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 354.025087][T13756] minix_free_inode: bit 1 already cleared [ 354.033297][ T7173] minix_free_inode: bit 1 already cleared 04:22:08 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:08 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1020, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 354.150819][T13761] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 354.186867][ T6915] minix_free_inode: bit 1 already cleared 04:22:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:08 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xff000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:08 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 354.498286][T13782] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 354.508578][T13782] minix_free_inode: bit 1 already cleared [ 354.518473][T13789] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 354.531098][T13783] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x800000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:09 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1a00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:09 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:09 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xff030000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 354.858828][ T6915] minix_free_inode: bit 1 already cleared 04:22:09 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="ef5d4988b94a06ab3a2caf6b1c19b8cb2db49fd962b5f60bfac5845a768140884063c127992a63caf8fa57e129cfa18a52deda3ccbf4c2c73e8060e68c9e13fc884f36b24dd0ad6454e30ee98e5289eb1045bb0f93536c4c41b657ac46e9b44f6845a642e628a3194f47e3d055", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 354.971216][T13808] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 355.041479][T13808] minix_free_inode: bit 1 already cleared [ 355.073676][T13813] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:09 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 355.235629][T13818] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xd001, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}, @IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x40}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r3, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r3, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x40000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x5, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r6, 0x6, 0xa, &(0x7f0000356000)=0x200800, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000b00)=[{{0x0, 0x7, &(0x7f0000000100)=[{&(0x7f0000000040)="fb", 0x1}], 0x7}}], 0x300, 0x40000fc) 04:22:09 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:09 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 355.491979][ T6915] minix_free_inode: bit 1 already cleared [ 355.519657][T13842] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:22:09 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 355.536068][T13841] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 355.551709][T13841] minix_free_inode: bit 1 already cleared [ 355.604952][T13840] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 355.638593][T13846] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:22:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:09 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000000)) [ 355.832700][T13858] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 355.849443][T13855] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:10 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:10 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2010, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:10 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xff7f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 355.945128][ T6915] minix_free_inode: bit 1 already cleared [ 355.959137][T13872] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:10 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c0099000300000000000000080005000200000001000080776732000000000000000000000000000800000000000000030003004864337f05bda83635110041c0ff894f89b3b28869e7728e6d07563c59ccb0e9c6953a742bcb15f1f239dde6ea0a8669a5c4d983966e2b62218478c8b75054236d2d2cd83b0f", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x22, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 355.998296][T13872] minix_free_inode: bit 1 already cleared 04:22:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000004c0)) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3, 0x0, 0x0, 0x0, 0x200}, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x88, 0x0, @private, @multicast1}, {0x0, 0x0, 0x1ee, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "ca6003d0a509e35b83da2372b5c138f3da5b5607ff5de3f876d986bf4b3d82e599c574dfdfb641565f7f570c6cd16a6df51e9fb60e2662cc04eefda95794b9b8cf3ef4be5ef0f8b9e4f2465c82ba2b6bd8d6d9ef7b45f027156b8d50af91cf21ab1b6a9be9398ed8d0125c180ac9c818fd33bccc61824f722835246188aafa2e18b81942994c167aada204d07fbc73c5b3a8f2966de55b092ef36dd91a99f8381c3666f650121f0ab01215fa37371699be361407cc0294bda7b331aea06482858e9f39a838b18d9dbfb334c3ad2bd5b6b0d413e6dec0dba43d88dd91f29012bc443ac347d07614e7cbf70133734af7e7b6197f2f6cd6a3d69f2fc0f0f3feab6f6afc892afb081df793b1299004fd437eaca1906df1e7e03fcf23053b738bfe7ae711806aebe6ee4bde991401b704d38adc749e58bb3eb3ddcabbde3456dabd2425fde90db92a9dc6983cfde6daf3f5176629174e972604f90f38dd3ec875b48b155a7a6970820a0309c464854a2672b8fc4b01375aa65490caa24d6acac3fef253c02bdad516a35654e1452183c13ec087eb844be013908a816c50aa8d31da660cf34496d0964f051329b68532f62e49e6984b95573ee2f0961fb3bac110a9f4b730dafa6853ba86fb311bb6bdc510d912f2ff1369768abb81db01137b2771b4ac19"}}}}}, 0x20c) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x34, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'geneve0\x00'}]}, 0x34}}, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r6, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, 0x1405, 0x0, 0x70bd29, 0x25dfdbfc, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x1}}, {{0x8}, {0x8, 0x3, 0x3}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000880) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000180)={0x0, 0x3}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r5, 0xc010641d, &(0x7f0000000600)={0x0, &(0x7f0000000540)=""/159}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 04:22:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:10 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 356.335347][T13884] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 356.358485][T13897] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 356.439670][T13901] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 356.467073][T13908] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 356.481033][T13901] minix_free_inode: bit 1 already cleared 04:22:10 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:10 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2300, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:11 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 356.817819][ T6915] minix_free_inode: bit 1 already cleared [ 356.885885][T13926] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 356.954909][T13936] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 356.969087][T13935] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 356.990671][T13935] minix_free_inode: bit 1 already cleared 04:22:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x2, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64=r1], 0x74}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') r4 = socket(0x4, 0x3, 0x5) sendfile(r4, r3, 0x0, 0xddf5) 04:22:11 executing program 4: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:11 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 357.248476][T13944] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:11 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 357.361030][T13957] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:11 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:11 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 357.469001][ T6915] minix_free_inode: bit 1 already cleared 04:22:11 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000006060108000010000000000000000000"], 0x14}}, 0x0) fcntl$dupfd(r2, 0x0, r0) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 357.643823][T13964] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 357.662564][T13971] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 357.680298][T13964] minix_free_inode: bit 1 already cleared 04:22:11 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bc0100010000020000fa0095e0612687ecb86a54880aa941000000000000004e2f98b579a782d270146d0e0206e7ff9f5400d7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='commit=0x0000000000000008']) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xd001, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}, @IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x40}}, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r1, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x40890}, 0x8001) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000280)) [ 357.826217][T13979] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 357.838519][T13982] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:12 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 357.901940][T13993] EXT4-fs (loop4): Invalid log block size: 65 [ 357.959081][T13998] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 358.017189][ T6915] minix_free_inode: bit 1 already cleared [ 358.038947][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 358.038959][ T28] audit: type=1800 audit(1592194932.198:695): pid=14004 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15843 res=0 [ 358.127639][T13993] EXT4-fs (loop4): Invalid log block size: 65 [ 358.136178][T14003] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 358.151279][T14003] minix_free_inode: bit 1 already cleared [ 358.168404][T14013] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:22:12 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="74000000fb9918c08389786011a5bc4097207f2f0900000019d9ec117637fde59950e5a5bd8e9f392fa5f123a9c35688479613a954636188d629dbe181fd5d3baf3c1ce6020ce124a1de309c94ea3d666cb9c7f68965b00ab121029bcdb761d72ef73020a3280b45f7e6768f0701d59ca2eba8e18d513da87766dc08a9a3163152d8f3b92d03e0695cdd1c51b81edb245ce958bb825fe54974c99969edbfbb14eda6e0821bbcbe408a79d060f0812456fb0a6434e0d61a73d42b529dd8b1897a874fa76770832d580a8638287fe848df53b2c340765d1753912975f729a048ce72ec5b2f6675012faeccf0e6f9e753c4f3aca200"/255, @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:12 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x4, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:12 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:12 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:12 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030093030f3d1bf88abb030303030300ceeddcb138060a72d4ccde968ff6bf4f280e6303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004105) [ 358.298812][ T28] audit: type=1800 audit(1592194932.458:696): pid=14023 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15941 res=0 [ 358.326908][T14024] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 358.355538][T14026] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 358.415679][T14032] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 358.424065][ T28] audit: type=1800 audit(1592194932.478:697): pid=14024 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15956 res=0 [ 358.443693][T14037] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 358.459870][T14037] minix_free_inode: bit 1 already cleared 04:22:12 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4800, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:12 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x5, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 358.472683][T14040] fuse: Bad value for 'rootmode' [ 358.492533][ T6915] minix_free_inode: bit 1 already cleared [ 358.540930][ T28] audit: type=1800 audit(1592194932.548:698): pid=14024 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15956 res=0 [ 358.541802][ T28] audit: type=1800 audit(1592194932.618:699): pid=14036 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15969 res=0 04:22:12 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 358.756950][ T28] audit: type=1800 audit(1592194932.918:700): pid=14051 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15812 res=0 [ 358.794403][T14051] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 358.801847][ T28] audit: type=1800 audit(1592194932.968:701): pid=14053 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15907 res=0 [ 358.824442][ T28] audit: type=1800 audit(1592194932.988:702): pid=14051 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15812 res=0 [ 358.863224][ T28] audit: type=1800 audit(1592194933.028:703): pid=14058 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16050 res=0 [ 358.881308][T14056] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 358.936408][T14053] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:13 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x6, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:13 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 359.045367][T14061] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 359.046513][T14061] minix_free_inode: bit 1 already cleared [ 359.156747][ T6915] minix_free_inode: bit 1 already cleared 04:22:13 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf250700305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100009077673200000000000000000000000000080001000200000008000300"/94, @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:13 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:13 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 359.211139][ T28] audit: type=1800 audit(1592194933.378:704): pid=14072 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15827 res=0 04:22:13 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x7, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 359.284178][T14072] FAT-fs (loop3): bogus number of reserved sectors [ 359.284190][T14072] FAT-fs (loop3): Can't find a valid FAT filesystem [ 359.340118][T14086] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 359.375032][T14085] fuse: Bad value for 'rootmode' [ 359.413788][T14087] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 359.413959][T14087] minix_free_inode: bit 1 already cleared [ 359.521373][ T6915] minix_free_inode: bit 1 already cleared [ 359.716535][T14098] FAT-fs (loop3): bogus number of reserved sectors [ 359.716548][T14098] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:14 executing program 4: unshare(0x2c020400) r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 04:22:14 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:14 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:14 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x8, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:14 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:14 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0xfffffffffffffffd, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 360.294029][T14117] FAT-fs (loop3): bogus number of reserved sectors [ 360.328217][T14117] FAT-fs (loop3): Can't find a valid FAT filesystem [ 360.345054][T14119] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 360.362434][T14118] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c776f726b6469723d2e2f87696c65312c6c6f7765c0adb481bd71f53075735c2f00"/49]) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000100)=0x3, 0x4) [ 360.398569][T14118] minix_free_inode: bit 1 already cleared 04:22:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 360.517950][T14134] FAT-fs (loop3): bogus number of reserved sectors 04:22:14 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6800, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 360.594441][ T6915] minix_free_inode: bit 1 already cleared [ 360.621172][T14134] FAT-fs (loop3): Can't find a valid FAT filesystem [ 360.625244][T14141] overlayfs: unrecognized mount option "loweÀ­´½qõ0us\/" or missing value [ 360.679925][T14141] overlayfs: unrecognized mount option "loweÀ­´½qõ0us\/" or missing value 04:22:14 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x9, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000640)=ANY=[@ANYRES16], 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x616080, 0x0) bind$l2tp(r3, &(0x7f0000000280)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x801}, 0x14}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, 0xf, 0x6, 0x3, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x404c090) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="840800006c00270d00000000000000000000600001890f9bef520d", @ANYRES32=r4, @ANYBLOB="0000e0ff000000000c000000070001006677000058080200540802000c0009000000000000000000040402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004040300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c00010000000000000000000000000000000000000000007f000000000000000200000001000000000000000800"/2156], 0x884}}, 0x0) 04:22:14 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 360.899841][T14152] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:15 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 360.972861][T14164] FAT-fs (loop3): bogus number of reserved sectors [ 360.978923][T14160] netlink: 2148 bytes leftover after parsing attributes in process `syz-executor.4'. [ 360.981053][T14164] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d61637365630000040002800a0005003c0000"], 0x40}}, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0x0, @pix={0x0, 0x1f}}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x4048084) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x0, 0x81, 0x7}) [ 361.016313][ T6915] minix_free_inode: bit 1 already cleared [ 361.082564][T14166] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 361.093106][T14166] minix_free_inode: bit 1 already cleared [ 361.142007][T14171] FAT-fs (loop3): bogus number of reserved sectors [ 361.147337][T14180] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 361.149078][T14171] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:15 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:15 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0xa, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 361.261298][T14179] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 361.337583][T14180] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 361.391861][ T6915] minix_free_inode: bit 1 already cleared 04:22:15 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="741d994977fb13065f813a5232c7a52577499e60709afe5d92f45c8356ed7565e75804cd61a4ae1795aff01eda472cff17d1d5f0d1783fafdeec4d5fdd", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff", @ANYRES16], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2200477d, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:15 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7400, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 361.474169][T14201] FAT-fs (loop3): bogus number of reserved sectors [ 361.477912][T14195] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 361.502279][T14201] FAT-fs (loop3): Can't find a valid FAT filesystem [ 361.518779][T14195] attempt to access beyond end of device 04:22:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d61637365630000040002800a0005003c0000"], 0x40}}, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0x0, @pix={0x0, 0x1f}}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x4048084) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x0, 0x81, 0x7}) [ 361.588472][T14195] loop0: rw=2049, want=6434, limit=52 [ 361.607996][T14215] FAT-fs (loop3): bogus number of reserved sectors [ 361.614366][T14195] Buffer I/O error on dev loop0, logical block 3216, lost async page write [ 361.619233][T14215] FAT-fs (loop3): Can't find a valid FAT filesystem [ 361.639058][T14211] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 361.665794][T14224] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 361.684793][T14195] attempt to access beyond end of device [ 361.691510][T14220] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 361.726922][T14195] loop0: rw=2049, want=6436, limit=52 04:22:15 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:16 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="01bb1506000000000000005aa64762cde95ac10159bc61b631b05cca02000000", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf2507007cd73a604b6cbb42ea310000140004007665882f3d88bdbfce7468305f746f5f626f6e6400000008000500000000000c00990003000000000000000800050002000000010000807767000000000000000000", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff36c40b382c14f9131542d462a419075d8de3c8856eabf3faccb8413c7f6b28659501bcc83aece54542b2688555d5a88088a662853fc556c1afe10af0f9f038527049d0a932347fe4b6b6207cea19fb17a33b333e780be2c8eac6136041246ab6c306b56f77ae14ca2e99b1a4eeecd0da7290d56455e73d27f8a250797c94a8e534e1c14cca6836a8120a5127d6278d5f97df25013ecd124246f79be246289b2350118fe76a1790d53bd811b2dd0ff61e6c2718698db634c7dc72b18e6c45"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0xf, 0xa, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:16 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0xb, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 361.788474][T14220] minix_free_inode: bit 1 already cleared [ 361.799736][ T6915] minix_free_inode: bit 1 already cleared [ 361.814042][T14195] Buffer I/O error on dev loop0, logical block 3217, lost async page write 04:22:16 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r1, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="74000000c9fc9da801690e8ab3e3b39037ef1f2a61435585b85a8fe1c0eccd68f96f56a6559bd2ca06a3c34b7909b17f2c75203fc67068a9fb81ac586719b5a974", @ANYRES16=0x0, @ANYRESDEC=r0, @ANYRES32=0x0, @ANYBLOB="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"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) [ 361.934468][ T6785] minix_free_inode: bit 1 already cleared 04:22:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d61637365630000040002800a0005003c0000"], 0x40}}, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0x0, @pix={0x0, 0x1f}}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x4048084) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x0, 0x81, 0x7}) 04:22:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 362.055142][T14236] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 362.083634][T14240] FAT-fs (loop3): bogus number of reserved sectors [ 362.122203][T14240] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:16 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 362.177977][T14255] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 362.184508][T14249] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 362.242330][ T6915] minix_free_inode: bit 1 already cleared [ 362.273520][T14260] FAT-fs (loop3): bogus number of reserved sectors 04:22:16 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 362.316232][T14260] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:16 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0xc, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 362.368646][ T6785] minix_free_inode: bit 1 already cleared [ 362.387373][T14264] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:16 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0xd, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 362.494491][T14264] minix_free_inode: bit 1 already cleared 04:22:16 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 362.606595][T14275] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d61637365630000040002800a0005003c0000"], 0x40}}, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0x0, @pix={0x0, 0x1f}}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x4048084) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x0, 0x81, 0x7}) 04:22:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:16 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0xf, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:17 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xff00, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 362.826906][T14286] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 362.851933][T14290] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 362.896820][T14290] minix_free_inode: bit 1 already cleared [ 362.902220][T14300] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 362.904296][ T6915] minix_free_inode: bit 1 already cleared 04:22:17 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x3) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:17 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 362.970940][T14298] FAT-fs (loop3): bogus number of reserved sectors [ 362.996550][ T6785] minix_free_inode: bit 1 already cleared [ 363.002090][T14298] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 363.074643][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 363.074655][ T28] audit: type=1800 audit(1592194937.238:737): pid=14312 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16369 res=0 [ 363.197954][ T28] audit: type=1800 audit(1592194937.358:738): pid=14298 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16382 res=0 [ 363.217009][T14312] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 363.264015][T14320] FAT-fs (loop3): bogus number of reserved sectors 04:22:17 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 363.320642][T14320] FAT-fs (loop3): Can't find a valid FAT filesystem [ 363.375483][ T28] audit: type=1800 audit(1592194937.498:739): pid=14329 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16381 res=0 [ 363.376569][ T6915] minix_free_inode: bit 1 already cleared [ 363.408470][T14327] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d61637365630000040002800a0005003c0000"], 0x40}}, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0x0, @pix={0x0, 0x1f}}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x4048084) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x0, 0x81, 0x7}) [ 363.442116][T14329] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 363.459658][T14327] minix_free_inode: bit 1 already cleared 04:22:17 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 363.470750][ T28] audit: type=1804 audit(1592194937.638:740): pid=14331 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir266057909/syzkaller.zB1rin/232/file0" dev="sda1" ino=16381 res=1 04:22:17 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 363.567374][T14335] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 363.605522][ T6785] minix_free_inode: bit 1 already cleared 04:22:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 363.735221][ T28] audit: type=1800 audit(1592194937.898:741): pid=14347 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16373 res=0 [ 363.788283][T14347] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 363.845491][T14352] FAT-fs (loop3): bogus number of reserved sectors [ 363.856309][ T28] audit: type=1800 audit(1592194937.998:743): pid=14352 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16380 res=0 [ 363.897217][T14351] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 363.900845][T14352] FAT-fs (loop3): Can't find a valid FAT filesystem [ 363.912288][T14358] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 363.935149][T14358] minix_free_inode: bit 1 already cleared 04:22:18 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:18 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x100000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:18 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x7f\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xd21\xe1\xfe\xd3\xb9\x93\xf7\xa8\xbe!v\xe8\xfc\x14\xcdpE\xf4\x06_~8v!Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 363.992477][ T6785] minix_free_inode: bit 1 already cleared [ 364.007439][ T6915] minix_free_inode: bit 1 already cleared 04:22:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d61637365630000040002800a0005003c0000"], 0x40}}, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0x0, @pix={0x0, 0x1f}}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x4048084) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x0, 0x81, 0x7}) 04:22:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 364.042467][ T28] audit: type=1800 audit(1592194937.998:742): pid=14351 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16379 res=0 [ 364.087142][T14365] FAT-fs (loop3): bogus number of reserved sectors [ 364.096147][T14365] FAT-fs (loop3): Can't find a valid FAT filesystem [ 364.118302][ T28] audit: type=1800 audit(1592194938.188:744): pid=14352 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16380 res=0 [ 364.153517][ T28] audit: type=1800 audit(1592194938.318:745): pid=14375 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16370 res=0 [ 364.161551][T14373] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 04:22:18 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x14, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 364.273705][T14383] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 364.289094][T14377] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 364.338570][T14377] minix_free_inode: bit 1 already cleared 04:22:18 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d61637365630000040002800a0005003c0000"], 0x40}}, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0x0, @pix={0x0, 0x1f}}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x4048084) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x0, 0x81, 0x7}) [ 364.375779][ T28] audit: type=1800 audit(1592194938.538:746): pid=14389 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16377 res=0 [ 364.402476][ T6785] minix_free_inode: bit 1 already cleared [ 364.424812][T14389] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 364.561242][T14392] FAT-fs (loop3): bogus number of reserved sectors [ 364.582292][T14392] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:18 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 364.665671][T14403] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 364.685487][T14405] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 364.715132][ T6915] minix_free_inode: bit 1 already cleared 04:22:18 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x23, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:19 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 364.895996][ T6785] minix_free_inode: bit 1 already cleared 04:22:19 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) lseek(0xffffffffffffffff, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x20001, 0x2) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000200)=0x1) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0x8001]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa030c7a95ceaa07d7bc0aab2de135922f4af25a3a07e75ecf90b1a75110a99f808411232d04900"/90, 0x5a, 0x4051, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_mr_cache\x00') r2 = socket(0x1e, 0x3, 0x0) sendfile(r2, r1, 0x0, 0xddf5) 04:22:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r2, 0x4) 04:22:19 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000023c0)=ANY=[@ANYBLOB='`\x00 \x00', @ANYRES32, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYBLOB="0d4d18f61e0adc913323e67454444419df1bdc8ed6d6eeefd01186ba9cb646e70f83d6be69260a1b60758b109a42dc354cb0111c7c93645f0799fc808beccc144a862dc03bad8f07cb9ca367475bdc9dd097bac3da737950f6a9eb833de65ce2da0a6bfceff46cebce337f8fdb17389da8ed063be9cb831cbf0227758f3b34feeb9201502427b58cd2581739bea09003165ab7d06a06a5fe31d3e5aa18d365896de0fb0016324b867acbcb23c7efa90df949aa6a4c84e38b80161f6997d1352b29299ce90c7c8c9e87dcfdb8a1c9bbedb3c779c464acc25a5f52672f261246f10e5cfbe3c06a0acd15e1e8dd1e418120332e4b77ca59a0ff3fb3ba082356bc41b2747bfd73f799c8036288221d69d0601bde95995481d51f72e68a98ae77a9f4f8d7079dd4936fe9046729d5664da43672cb89a5d1ccb2fc252cd19bbbed1ba59a352a187ddacc596617725545a4d94e8635ec09b9dcd6617cb3be7791b957e6eec0b2e3e9a60ae03cfb85a0eb56e393b7ec9c9c3e34bfa8820b531e6d164f59d0c60e9d1b3cb46af00efa2999232c4e02cfe16080e195c4ff3aa11c670137eacf0b6492eb19979c72c593dd8958cf8cafe239a0bb2210c0c6eab1ec4fec000b4d2d334e4f6cc1e61bf1b69aa27b14e01413444b9e3f9ce1de80284d06dd16fe53b0b4ed4e7ba519b441cc232fb423fe6e49e98bc6bbe187d5d05fe1edeb0fd58274ac6b264e17bbd38fe9d4014ee7c032df9aee2d5bda21ab7df45d943127090e552b53763da8a2fcac4ce97be90ebc56427c4dfebee28b04a8e40fa0105ba204f8611165310cdf1d30bd576057ccd2506bc7f6452cc471f2b42a8e26ea1ce79b9e2b0b14966e0985622713bcd5d33702ca4f88b9d796daf1c2b62157323ef2168dab05c2484f1f1e0d1bee604a4b9c09e2e38b31809bbb04ed8e8515653777d42f8f1d0d0fe86061a2a2e977439e07818acf3f06656a8d455e48d0c3e63aaa961adf2995270edef4467a8c048789a8f953691c19d38881e8436745d5d77a00731663687354cc6e3af6bae7ed97e12c580a811ff3f37ad7ed99ebe5f7953d91de694a00bd12415c53a0f426d096f8091e2ddef8ef0ad997d1f3f880a6377910e9cec9a66bbafa61fea8369626501edbd0881a8f00389807f463dc73fbc1db1c1851263cb8098bf76ded86035121308fd1506f2c6a06314c93d838e0ae1d997e47cb683beedef4c8d47bd647f7f64a38c530387f8ce9b5e0f00ffad68b65cacc0e0968231b28c19a411b981c6ffb69b0be9f337dd27544754cefa9d6db7cefe6d234fb6166fdda02d37642d429efb4beacc13849f9e4716414201a33a3cf2a8cc8336eb8e51045a689cbfe3427a779f29732b71e5d54d090ea4765e7a253e15a6f08f18559ce3d798fe26c016802257ccf5476e44a0819cca8db1221e82581b137bc9d6d388a90ec9c8076753dc721ed74180a0523cdd20846048d4313d0a24537527c2e65b1f0f588888e9bfbbb188e242e1a68e6089bd8e226f53d743c4e728c8575690ba6514c49c0870b271fbf496602dcecf79a9061c8ccce74ee60f6b3037dbb957a81c105db7cac3a2f95ddcb5ee1ba9697c8ff9f46c8d86b791fff588ef184aebd358bb28d3df976c09922200f8a5766e1fdb4c543252b382ccb9e6ea820b199aedf5462a50947092ea84f3f51992b408d2a6fcdb6fd0569be46d64f5cd8cc4ddf67eef6c73c33d60976062c5718bc288f7bea37693fed5666669a907f42377967ad74ef9e0536c531eef0eb3d52932206f58941671e688266a07afaac5f7183f332697a6e4bc48a65872d033c06fca4d2a218d54ae5513a5b7871b70853419f2d31acc74ec09191cb9d799b99a06f9501ee32d938efcd637375bb8ba487968dbcb376d5cf9c0ee2d45568a77d0da4685d857d3ee534a67ea065b19eb3b0039afe39f6e302bcf39f0ae66a15e1e276aaa0541993f8d4fc5372a9a5c69a27882650912afd487d5efebb98facfe1a88185e7553d801569b0f4379bb63a7135c70f6f6df522b2ca287c5a5d5a70be184c1c9fdf2be73adeeaf527c827960bbad5191f82f343488d45fd60087e9b80955758369548de06c212bf3cd3431436bf3bd85150162c53015c5c51cf165830b3bf0aefab22c1de47dc124221d4c22038b3f920e0f85db8aaf291711b5e26bce5a86b6765977d9b897f68599014f537aabfe2b41849a1a0491979e1d56a08e9bf719ff4fdc1960fb4a834e5adf7e8a38b26c9643f68c1bba5f0366699f28be01a6be195d67f1fb1e2bef6075607a0641a7addf3ed721abf5ca9e445c15225b7bdb62667d1423de78f000670ac2ba1685d10dc5b9049a11b8670f70e8a37c9f5b58f6f2eec6a0d243dbad23a0a0a865556118c2b38a186419d75d714f7e51c3c4e22bfaaffcebeee813e17dd51105eee79aec79e61e40764e719198a05948578c6516ce21f22390b21f9bf1c5f610c8c0544148dc247d61bff38d3585ef4529f8d261dd606165a527e3a8928f03dbf79e14c6ee9430ec8ca25510bba9161265c4b7941248faeaf5abe13b0d8476abbfe883287d3555b5fb9cf5f88df5fbd6b0ef3d34e5d9f4fb2e18e9f7fdf7b66ea4a2139d84c69ec609b4579da23d698353b36ad2cbfed81cfdf232757d7e0949eeb529e5f14fe51ee6a766c247e345943a760be4d800bc2bcff1196055cb7795a78f95ce357139891fe7921cca3ea47c542d8f311cb8e698291e9eae46dca15dc518b424b23a5c139a932208f28a3b28793f9bf6e12a97787bae71b163cc59698cd3fe821f8a0e3d17ae22148fd4866f24065244e1bb7f5dddb603a8bc230cc2eac00eda2fe0d1d6ab76a1fb557162f42b50e8a2b6acb425d40ccf4706e0e986688669d958acb28c9247afb94e68361fcd7c6fdec4d142b48a6b41b78d3e2276de1326598c317d3f63da0bb73b956e3ea5056e1691c1c346121cc8e9b5c2274f32b49cb249f74cba2b43debf14ff6d4969e0a2b28846f2acba77857bcfbf798b86eef30ce0cb74a3979d1b599723507508393bd06c4ac7cec77e9dec5b4922a91ee66427365c9ac6306198b77dac7bf6219ea9850e019aaa745a6ad07799bd2eb5068a15751334f25278220507d5f55f5f7bd6dd822a3c4731c682928e62f4317a20ed6b25b85c437e464cb61d88fea4e55836550f33adecb617be992f529eacf50514180df645810634c584915faf9c1e33b701b8e681a42a8713d5abf629d8499c69bb6640b5183fab5a30868532bd5b4aa2547955989174b6391d8e5f7e14f75868d9b4e321c8f2fbfcea57d6767a033329e48b8e551de17365fd7d31b6370ef946b6f2b64f250615a9fe6fa507413815166a12ab5ce1d21eec613e28db54e78eb78156c9337f5f1f883124d5c1ef503e730545dba67a5f88d828ee1ddf106d8b61b915c200b36bbd772bd2571fd3884c1b5a013b47c8ef2a5986bf340b20a8453c3e5bacd7946edbf81d0dd11d10e22fe946145d2032f494fdaf73112fe4047951c81d773912fe9888ca75d4073ea77615b56bd1e42c4497a69281851e96348b166bd648bcbdc4482478d7c3cef2ca744630c0e48e7eafa4d30c5132bd64b4d268793c150a2c474c80165fe72e9307e5835ad60db930b6b16cce0ceffecf9159dcc1ee8782a04f96cac8f214ce922b59ad4a853430ff8f06a4a90d5499614a120d49c55d550084937ebb7ee035d187e7abfd53a6ec1321c55ca0ef593b6fc7a1ee7f16d527ff3981c82ad9643898d1476d8c62998dbdda90c7157f475c9ff276980f36c30b1a446b3013ce4c4c8415cba1f38ad90822d024a73cedf9a65298250e65415df5730cbdd97e861c7d75015b07b4854e49920be447b7cc876ca3ffd52cca119900c7d01ffe84d2d386281d4059be12d53600918c74e403988d16150bad5c1206a8248ddd4f244efd8b4034ee00247d60e331183f18ac0294f283f95499bb4405e6e0e6c1a9eae256920cd08bafea93685c3be2d9ef1e79541898c3f550b91332413776f3678a570b84d417c7bedbf59c6438b7fe2ffa1b80b1b3a73f71ab30dac54734448b3608acf0b7a4f113c63057017f87a8692ab198b88f7df193124e18bf1bbe8c05e326221686ba7a0667d4bf66aca562af568a47893fe14a11126f946270b9d78b2efbe5c15fd32c6b138d9be0fc9daa68ad4574734b8d6c8294b9ca0e1e387a2316d1f54aee67be9f1100ae3fd781e92f0797517154f3c8ec5e8db8bd98a194257c8d9e76cce262da72a5c8036040a848dc92a1e3e3a38f096f80239891be18a8574b237c05523065be8769df874ed7640e584a2e3395711c6bd15505421d004c268d2fa5d4a3e2aaae186438eb75e4712cfc023aa6862253bd51dc8b4ad47b9454e27082c01ed9babc8af75e85df2d95e91f65a1c95f3e338514b25a2880ec6707bdea737c27ed70329fcf4964ec1750ec68b611a58a0d7a4fdb4a8348cc17cec901d03bc064f14c7910074975cd2b5a12c324e1a7e0873be4ef675fb633702ba16b48e9a4899e84a6569093e1876e80988385470b61e0763070e2ac75901c65e79d7b560b332969d63b95ed3fd3951b02600d551280562da5e6389d79695a13f87bcfea52ac51455ef80b76983978a994b3ea2e69337a721135b0d257db70bc0728ef25f9bf55728448885668c655459640e176143a5095a70c8cdcdc451855ea1ad5bf3f8e9d25a1aa1ae7013654b808adf9c395b9d0accc47292c08fb746943f0823a57e6efe0769297dd2cd7596fa7fd6f96a7dbbc25ccc3332bdc631e41d4e69ab5d6a76f62a0f607f362679998699ca06e7cd0b198b44886a0303695f243330ac2e23129e81db837766612ab36382d2a78ffb5b5aa6fab613ec06934a5a11e57f8f96f9f633171439017a4636a37321cfc80e3fb49c5811be7c82602948945743cec0c75a6a6877252342e09371770460ac3fcc64ba7eeeab19bbbd978412476941f8c86ce02655ce542dc08a09e4ff4ffdb9ccd73a4e35a7c306fb4a7958a8539f195ae9dffad26bd7002342e017b9c2aa36631ea2c5e46968ed2e96c278b9bcfedc2c971a6554c546ec5642fed4b9c3ab2f86aeba35a67b398955bd1459714b6a608844352845a996ca134410be5d475edd6e04f609a2b299b357fa0aacb7974e8e8316abd2692ca6ab3c71c9a1f04ce4b47b3cb33f5fb4a0062a3c015893285025f8b6fb11871622614a7b2fe557da1491484e749ea33825ae1b70018b8afea87d97072356709f70dedff1db516b0115837a31487e3cb7c11040b7b2811b599246e643de994da70c3df86ff0d3f5729c6f976c581e10acb2e5becc238f7bc066fb5494f5baf38608ec715fc4b66161e7496c87bad69b50318b307ba0be729a9897a2163ca45873c039ee05d2b2ac1809bd20bdf0ed2599c4d8c781bbb8cc1976ddcc01815b23b867a23edebdc34d0ae5043e07f67eef2b5bdb8d95c9bad25fed7043db9d3bed0fffd014ef0952fc58dfa107a95890366a264dd6d3b69eb0bce2533597497f8e083fff08b15e18c418daf498de8773a037f0f8309a1377fde445cd87d55755eed0c70652abc7e1f5cd83ee30c47a6da347a6d9a8deba3708fc5882904fb79d1c75059a4415f0d885f57c643ff3d456882d65a2c2fc3f44fcc96b8c79a440a8fd73dd3ba9c7507c8802269e607187660451ab769d1ca320802496ae0e1948db96770edd98224ff6360abcc256fa8faccee08c9b36cb70a936f0f8e040a09fcf109dcb78c2d3eec28e3ba9d7", @ANYBLOB="00000000002d878070013d74252dc7e87f4e02d708c2"], 0x74}, 0x1, 0x0, 0x0, 0x40800}, 0x40015) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') socket(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xddf9) [ 365.154606][T14421] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 365.176872][T14418] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:19 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x400000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:19 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x2e, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 365.269331][T14418] minix_free_inode: bit 1 already cleared [ 365.292022][T14438] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 365.311331][ T6915] minix_free_inode: bit 1 already cleared 04:22:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r2, 0x4) 04:22:19 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 365.405609][ T6785] minix_free_inode: bit 1 already cleared 04:22:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_RECSRC(r2, 0xc0044dff, &(0x7f0000000000)=0x1) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000140)="fc84d48da34fda1fcbbf980ea59940a6bc167c58181475929489821a881045efb0f21842c28bce48a1eadfee5fa39f31569b41dd8da967591b20dd283e700eb632536523ddc524401ceafcac3627b35d0214cb21ffec503f609e55c29425d0d80ea33d743426688c2d27430074c943b355ae885b3760ce390d2f7fd178c41a377e7eb1ec31ae3a4e2f470cd69e6327816a6a1c5c54b2d04c2534da5bad02617643812b5af22ec020b494f7eb1b53cbe94fbd23e3ae7dba305d5f29057d47c7b70aefea5769b84c511261fe9c9bbd6f9d7fde9ee9f119328cdb660b9f0002390f227b0817256fcd7bb5d3def5dd4a471d78189b68314f883ac1", 0xf9}, {&(0x7f0000000080)="6280a20357c05ba35ca7c855f85fc5178f10c741b94aa3b846a393fa1be1e1ddf1df8f8a0fee", 0x26}, {&(0x7f0000000240)="03af50416b322481e1609165713f974b8caa64086e20c541aa28f6d0303a2929f1a19138b1bf83bd4d3b105c285b8d8207f2ca8d8e8a0d09b93bc0458796a1244598bfd0524035866fcfe7c0f38a4baaaa3d3f3581a8d59dcfb830778da9333a984d3ab7a2da5b92ffe351de547e05243e848d29b38eac3f9f", 0x79}, {&(0x7f00000002c0)="3e50f09632ead19168abede98cb50eb4f04f3d6091a3aa3d5547fb31fc7fb3b639b56adf4af7b94bbe9a451fd82d9b844eaf8219ee5e3c288b062dccf2b87fff408529463c996e58110027247fb082c61495b8fa1fe014b8ce4df908aa4dae3675dec4ec88edb21cfa4460ca75f56f5010ec025b85d416dd76f4876025510915181f9a646bb1b94426ddb4e654771f1fd1c3d2a176d449b60aa27f51b765ae7857", 0xa1}, {&(0x7f0000000380)="f0b6d988d9fd5e0ca4096f366eedee61f05707ad93b57ee1e146389430b5fedd5d27be8a259d30a74a60f7d6c1dfaeb59ad82d49526cc846cc5f7fdad9354cd779f3df2a147008783c000fcbb86a37dca1f2695b95ca18", 0x57}], 0x5) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000bbab250d26450bfc0000000006002868e3", @ANYRES32=0x0, @ANYBLOB="00000000000000000500110000000000"], 0x50}}, 0x0) [ 365.517760][T14457] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 365.548434][T14457] minix_free_inode: bit 1 already cleared 04:22:19 executing program 4: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x10300, 0x0) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYBLOB="a570914fe67462c96f7bfd4197b433304a540c933b6b629d5a26ceed72554cd139d724aeddf589c850a685247371a78ae72f0654b57454af969c3dc4e2a3f0b4b0ea5a2752d1053a56ea0bfa2b18ffd5f60f039e5c4b552fb3b24768a39bb735b875bca3cf4d6f39b9199020c452b8"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x90) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x5c, r1, 0x601, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0xe645}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x30d}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_PEER_AID={0x6}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x4}, @NL80211_ATTR_STA_CAPABILITY={0x6}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x9}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x8004084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x88) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x30) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000200), 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xa808) tkill(0x0, 0x3f) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x2) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) [ 365.609464][T14467] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 365.630604][T14468] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:19 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x600000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:19 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x3a, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:19 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 365.793285][ T6915] minix_free_inode: bit 1 already cleared [ 365.803283][ T6785] minix_free_inode: bit 1 already cleared [ 365.960549][T14494] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 366.001347][T14483] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:20 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x63, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:20 executing program 4: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x10300, 0x0) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYBLOB="a570914fe67462c96f7bfd4197b433304a540c933b6b629d5a26ceed72554cd139d724aeddf589c850a685247371a78ae72f0654b57454af969c3dc4e2a3f0b4b0ea5a2752d1053a56ea0bfa2b18ffd5f60f039e5c4b552fb3b24768a39bb735b875bca3cf4d6f39b9199020c452b8"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x90) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x5c, r1, 0x601, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0xe645}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x30d}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_PEER_AID={0x6}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x4}, @NL80211_ATTR_STA_CAPABILITY={0x6}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x9}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x8004084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x88) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x30) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000200), 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xa808) tkill(0x0, 0x3f) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x2) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) 04:22:20 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x800000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 366.137095][T14483] minix_free_inode: bit 1 already cleared [ 366.146341][ T6915] minix_free_inode: bit 1 already cleared [ 366.159384][T14505] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:20 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:20 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x60000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:20 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)="64aa7c64a9fc8873520dfa1ae3a9693eb87b89a440158655aedfb56b1c4c3dbdaf26f0bb82c2a3bc6c4d5871f6a058d4a3892e6aa2e8fd5408ee4452ed2af725667189a526fddc4b9b69bca1", 0x4c}], 0x1) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2120eb673afdbb990f785575192e2bbb83538c57b4f1a09301363a8520a54a95a0a13f4ada473d400062e0a1e40656b37c0d183212629269c801000000000000005d2d06"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x8, 0x2, 0x4, 0xe000, 0x3, {}, {0x2, 0x0, 0xfc, 0x8, 0x9, 0x98, "1ec5c25e"}, 0x20, 0x3, @fd=r1, 0x4, 0x0, 0xffffffffffffffff}) pwritev(r2, &(0x7f00000005c0)=[{&(0x7f0000000280)="08be425facf9935dfab5e00ca4c4211925f5d8a5206c962a0f108d3739ef666e1038c07569af56665b0cef0d939fcc4857569f22d62cb8af4f58355a55427be565715984bb0f034e2d78b8f16851d2613517af6be92f88781c43e35699c26243a990a026f96321ea78383bc97463f9b3e6a025e2628d4dcf2d1ac3a128c92861bbfcc4c54fa4871712d96335346771421273d272ed91d8635af4e80845ff2bfaa9e2a7553ac87eb681588582624cad81f57d54aee4ada63d2dacaae26e36c598443774694c8e70127c5f688751f7937c49bf853050a22be0c32d2defdc44c8aed184a7cfbfeeced45f68063338012be47689", 0xf2}, {&(0x7f0000000380)="ba3bb9c09df1b9b31e7197aeb971bf54dddd41a70cb5dbddcf37571ab24a4e2ac774d33043c8915fd5c19e287b9a63f6a54641196bd91c09a001996b599a55f2523a14a674298bcc597d6ab6d3e83192cf6e2f882728818df8b1355cfdc66bc2238f74b697a3e944c5e13a6dff4f0118da86e40e9928d66b57b1df14ed", 0x7d}, {&(0x7f0000000400)="9b4bd32220e985fbee239924016b061522c6292f93d4ca3874fc7157414e6d23718e4eb10aa1f903f841bd65c6006a03b72f4b932af8ee88919edbe984fe0542edb431a4bfca493582480362c90606222be056e14638f11bd97ff55dbf077c74242ca870f613d7689543e55dffab5adbee165f2219b487eac97c2e1847eb84f17df0c2fe1f73c6a3c4438f2425cc0e5a899101a820d004d9feee6191", 0x9c}, {&(0x7f00000004c0)="c6f0e1f00cba21faf214df4307463c8ff455d182e37867368830f4f37c4e99574011979a0f6c9c8540cf3031d3634a63dafb6cc33b83bc2161da962a5eed5c4a0210eca5c6da1067964debb9f49f5c73655680892996a448ad65df063045a56f6daf0495f49bd162c5d1c6c118d4620863f201a7e0112e7c24c8377bf0c4244232cdd2168265ee290db45a62e3b1c5097c27c0bcc76afb094bd55a77d51432ea9a8c2f4c8e768191b0ebd4476b8aabf86864d72d6adf893ead2f362fa388ac68946ffb0e70a5e860ba433b3af121855620fb3c3f82d32c473ed9d856592f7298ebb35170540b21f986", 0xe9}, {&(0x7f0000000000)="11bf9d264c7034721b83a2d6135145390c78d4b1bb01c6bead52023e3a9e96329905389477", 0x25}], 0x5, 0x10000) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r3) [ 366.445229][ T6785] minix_free_inode: bit 1 already cleared [ 366.522866][T14525] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:20 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x80ffff, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 366.617337][T14541] PKCS7: Unknown OID: [5] 6.13.11851.3561.987264.0.0.0.0.0.0.0.0.0.0.0.0.0. [ 366.636558][ T6915] minix_free_inode: bit 1 already cleared 04:22:20 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x65, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 366.668762][T14541] PKCS7: Only support pkcs7_signedData type [ 366.684532][T14542] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 366.707566][T14543] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:20 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0x193}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000140)="94f4f2a081acb9a4df7254634caa08356bee28ade7527b487f57ae6399520cf77ff60d63a80ed636d2e41577dc4399cafbd8cc87783c50ae175c4d3031166f2f3402132cb972a10ad05e4ed376a7021711ab4ca9cde2dc0c5c0d293328b03412627f561b22e8aeac4e008a9d53f7aa33f83f9465150451c761422bd82bffd56dcd91dbac24f8c7fd46c3354e127ec90e78de55bc1c81dead95c50df8b200a5af32410d1c9383f9c8b765d9b71913beae23e3bd9712a139955b18", 0xba}, {&(0x7f00000003c0)="8a4c654dba1e5651c18e5e701b8f906f7dd62f1a984442490bd0896c1158452c18059af76c514e4335037f688d5c1cdda9955f6c5c3755072d44ea2f0cb8bb247a078f8bf830ae7c1366d8aac84dee47fe6154f5851678f6a2a8f5e3614680aa8b84e08bc41d9b46d306cdb8d462cf5d1f67d01d90b6aa8af47f0aa8ed67b74def94de030751a039343d176dc5af4f6f6cb50562ce084bc130a9a46820d39047682d92401438c336ff0311a10b1f9177a40212d8daa3737367f894a251152b73da635edab3a9762c331a05f4c16f6949", 0xd0}, {&(0x7f00000004c0)="b2b161885d4cd71991f83feb3c4a4c6e14e41d4344575b085e61b835fcd06fa9b7b40cb5b8a836eae7b93390911cda2ae03e95e7ed6d3f413d7721a878a72c7f549c93140d63638cb9aec6770c923cc0e67a4161ca76176c00c07cab85fc4416636e906799085673bd4e44a909c60b6047a166759d9be17ce47d601d40514bd1e9bc07be6f076d00034c0ebe0f1cb616e772c5a521bf51f3e32d8413b0ea0b1b1da71eb71196ee05b254205c79e744587dc7a07b8a9ef621e3dbd23590a64be887061bd09716d095bf73acf36d872749fa546e8af87bd58917bd841f3b4f9d988069c12016b14883694f6fb8e3839b8109e63e4b82499eca78b8c9f26e0ca55f37a73b22b27de2326241f1a07fb89b0749c6de1afbff57a777e0ccb5933e615e1a608dea262064b8168895e0e630e3d2290dcf2e9e675585ea725686883b4fd36974a3abeb3e34a08369504ca74e14fa102f48b80cd461a950eefdd9f5d5a0b49e3b375ee2a924ac320eb82eac2bab7757708b24ea93d10ed997065dbcc8752e4305397917d7303d94effa30a78db7988b08125980fe66de1c93dc7d3be54cd1ae2cb40fb1f248bd053b73b12bb58502876ff662ed141657920f70fe050f47b1b5b51da8a9ce89262d9c96f6b09735d7e0b7b597e3feee7b5e0c61f3f2cfdb1ccf10cd642ca170b9ea5d3e2fabbf30295d9e0408f31c7f0157cc1fccd84b54b811bf90c840015447b7e07016e103eba96688477456f09450f71291600d35befdd552129f4ba4a4bfc74b71131ec0d1a1725323c3ea293205c436190c84e842bcaccc81439696fbf7d7009dc961ec9a2a8613ebd0df05442862f3d299b87995c7ab71b7a604e3edf2a28fda39234144b498bb7e7bb63eb2830eea44b5ff1cd5632c632644cd217db8c70c27977996f3566cd9ec26e657186eb5b69772d7d40c0b351e1c20bce38b1f8de20ae80f78a5324cf08d7f85c95f487e81e7f9ae70cbe87118d68f6a4388d4a5d7b87ac5116f8f531c2bba438b4b6da38ebad748fb691f94e876249f51fff1c86cca7110a9e5c38f95b6ef237d9454e76f70ee1ab6db4ed17b56159fe2223155772899b41da4d27fb23b1b66372237228a1500bd2deb72b08158df8a278653c3a405fee8347eb85243dc0a1a202ebb7c4c6bac63bc59520b34733a7532ac9c5533eefd90206a4ca2ea18038c346173b0a0f20cd6074bd2d1c2359d4dc137a66a539352525481df8d898bb2a65c8b65d36e456d7885a05f1526a6a49c1af7c90ba4cb2ae5e2eefe71fb91c5ab22a6672a1e93b0d3c9695dca0f85d8651af89cd806023fc0eccf1d3a7ed729f41d8ddb0d8abcffbeb02c446e834f6f28aa75925736b094255ae72359fc3cc0223b51616bac3475433a3fb3948c95439274c8df5d9ebe6264ff94f427a641f623052f1b85a4ea06575d7a94ef43a468e26c3b9a8f5a219ca49fb963bdc7dd4329b539b541c5752ea8fbce59879d5ae4eaef5d50d4b981c598f305cc2965193cde79a2e4602597f8cec4514ec91fa808ab8bd91818ba7b166c93e5b6f00f3d6657f433036874ffc648e5d87b0c33b35805e17c195320b7d410c1b1b25a19368b8ee2112fb9fbb4a187105156319f29d6574a1b53b04482632d492612b239e991cece20bbff24b05013289f9acbf23f285ca61a7d68c8e8f49d6ef3f070b5df64dda9435a8faba0bbb956b37a8ef225db0de2102f6be7c4df410264c5ffedff05aedb2d847c9becafb0fabd13867f4109e2a0f3196d9344ae0c3690ac8d81b27b9aaae37e95f5119636700bca1344c6fddaaf24bcfe8f8df97efd8fc7857cc3293141b5b91b7753cf0c70882b7b94574787b189df8cfa403a3f188a2176b3589e6f355d00de8e90c9c1011299b4a08ab88ddd6b6a512b97a7a1b487e0e37f0fcc8640dfc08888a995cd47e2b7314724dc487926897a910eb4e3edb8582e474f1a8f27189ea468207402fc346134b3f8c1b21435d4d3bffa9cd506c8a39a0daa44f78506989f1cf1e520879b324626735fc47a6b76eeed2241707d754185e3f6cb5dbd1aca1e5ad5befce940c4b2a5532d251550adad23fdf20f3a3541041aa5cb389847e39db1553c64e16279eba6929b20a5a4382848c5d2929ef82f0f1844ec2c88081e370043177776935bbb125918969247bb849834d283058d4648ea6dbb1a678a3247ba8e4baaab41fe4ad4ececd4a7d30cf0cb0b7829f493e228b7557a82d913f58bc06f83757fcb1fad0bf6ea123814ba9f9df0f4c956f53940f697aebebdf8f00f3b31ee041c48762487e7f138c2da6e1baa244d3587aa9f7e0f8b4e92812e674ff0c0b6afb24640f5882c390aec78ec58252eb86707c85dc64defd73a55f996fa6bb7c860265591c3431656cfd19e1e531b325e79053d8c41838cca53f87dd4ebeeb46b2748f98175393cfbacd9d76dead52ee580ad9b9bdde930e10f374409a961c48502619166e12ef1fd1653ebf828201483858bf314b2d537606a4160a35dd998d8fa3139c4224e40a193460670e71ff5e0866a6603119b7736c1daedd6672454ed2837801c396dc67a9d2b96f61a0b9acf4e0e7141eb4ada9bc7012b50a7dd7bbb73e708196269c1371a76f28188cf6e7bb9062b59a060879095f6b6aaafb0332765d520097d07f3715de279f77f9c35b0eb94e3cdf3e7b11933ed7cf6e56f7931bebeb22634d65612001c61ba618f2a00cf3ad4bcf34d269b6e67ed567be8efefba7aa07dfe50067cb4a5c04bc19113597ce7073811d20f9d97ae9227a7fcb100a65bbc6fd46660d5437981f865f9a29858dfa127c8c453cb23c5777bd60b4931e1b40fd04ed6abe3f6450c18c8a3fe9a8ccb052c748c72e8821dec8a141a05340a21bd3a3a2634fbdad5b74f917f1b09566f73bfa7181a9d5ead1024cabcdef2c9c72f19a964c89d4c11879bf9651664285d788536de39fe12e50f34a77047ffb0b0885de77ee5fa406b3a54986daf0d5a6b161732a756edbf22952a81cbe7e6f14d61e76bf9781d23dcb23a42e482b72cf31b69f3ebc20ed8e815c1b10ee7df5c2d932ea2dfd385c107fa6dc2f1e8a32551a1dadd8950d9eb1411ec7bd112a07f9a5982c8e93839d383228df36bddb845b0b4e17495fec43aad95cf86f3801875c55e2bc0f9c3485f721dadd1cc4ae78751fb3b7e5fb5f25772e1d0e826b0524b9e1f96aff5fd5eb89bb2d0a004c4b138aa12d51d3eade539f0db0683806c5ec1e25cc96f8ae241b9213b40a547787f3a48aeffbec7f087f358a9a33d45eb42514ff1e8f9e314c777351bfbfaf9a25e9f65620d02da46d8d4901b31fdbeea19c5bac459b328db5052fdde3754bcf3cd8aa4c43b321fde503ca10f972d3146aa3f943038667248e933c6927d4977ac6d5158507282e3303af711b3195f97d2aaeead0f54d6b965603a6ede30cc4bdd35eece6f7f787c7b9b87ed57a14a3dac5b8a2d6b03449ec06a50de9599bbea4ccca6abf3fae24f7ace2f8a2dd23d2792428e65b931e867065ca7b3a4156bbca46cac599351127213f736dc68031c4bfd08a539772f12d571b60eb82d425f13267f8d1f5b12e4d6906bc5a6f22db88ff37e2bd927102623bb618bf93b9c9897d9e946c81a6e9b7f287af04c48e33d57481edaf7b782661e9c340174500f9ce0de4322f376baac4caf388defb0f107432a8312af35b1e3adbd3d1de0a9e4d5fb5877e4cbe638e626115e6d3e88f35159f1fdee48deff61671bb926f4f1a017483a9c1ab253d8518110a69744eb5d39286a76348071f9d74b807d4c7facad7e76fbfa086633463310b7774649a386a0144a8ee6772b57fd5e76bc06c141f00ffa4b06c7a1459daa9a8c808ce6081765a3d03e1908925ff45b6d9eabe1c570b6bfdebf35a9ceac1cab76df44bc755523539c009a40873531e6f8d4fe30492af404ef2259461454b962af5dca1fa5a91372b3a61ae6a124fc1d0f64efe833e6999648382edfba9ca625e8f50f21c8c29019af4eafa4f3db675fc888ec0ef91aaf873ecf6fd63336e11b10f4a6e24538354d3329e2418926afa9ab68d340bf51f5cbf5632e248453ef9093f62ef8e72c6441591959419456c3c968cb7fa87f2e3bcad92c469c489cc651ef0e11cf972fe6028b8ceb0b9a4cbc664887dcb240e557dc860adc978d74d31e24540d67b0a96b698fc1b5ccc0e76e0e600a752480f74293e1d532aab25d76dbafb35d16596f2155a48a9af7daac10f383bf461f63518e121121976a7b1543259665af5efb2407896acc6d45fea566820bb04e23ed41a101898bce09bf00b1ac817fc155d29468a1607a50c54a58f379cd003b5fb96193603e5a510ee1847476eb3fef1cba700d2bd8d69ee711a303ad828fa9b336347f34855ca742f6064d7b56fe6455111665ac90e409e606450c52d11fadd425a44b5bccc0493e546efc4015700fc66e77e1e94a213d5535ab77aaf21fef69957fc33d2ba0e174af2fd6eb435817c88bbc8583e9b423fd1eaebb6386f08361df340fc546ad7f62c546996b9ed6768da34729815f99b911487022915b4135b64c86a4c4e1748c9b04a60d7f6ccd49fd18d2513391cf1e11aa14c49195d5a74fb671b85bf1be3ceecf2b2d20991a04327c9d79f98845a209635261c3a2e2e55b0b799b02847233a08b31b51df952f9f1a98e55ec8f6f02fa60bc5f286888410346e18eb3a7271b9662f5f27ff95ae643761e04649f5762e36dd5e0e1149621b48d7130eceb0e806d942e4e7a8cc64c1e095a871b351f9c2f7828ec464f542fae7f061b54cfea2b1d3bbfa8bbaf9b3f527d3916ff01e6a7ea62508b0ba4045943ac070d29227900f8f1dbd15fa00140b82c2698738cda45d54f178f9e73306610e23b43c352588a5734ffc9cc572dd3c89a148142ef28ef088874ef44d4721635de99131fe58dbe3d653701b688893a1ce3b0c7fedd3bb520f2c76f754aec76c82b539d2a5fd76c66ae7065b4a0a6a53f7e9d7344e7ddc9d63b8b9176a876cd4518d379000364dd2f7e37708518b04a950476e32ac3393ef387fa4016286e777ae9ec2137c2c21ab457d6980edbc69e9a726737323d421ef54272e8763f407949950531158536c1ddf9b0fb7646c3f41cd994fa9ab958547e13fab05a2bdbea3960aa5b10a604285b2f29d56ec511aa0142e7a77bce20af75762f3875bbeafaf8b31199555953f4886fd6c7764a932113b3b933e600c161129bf58853ef49b577ecac5a1ecf341d3bdc9d92e59dd885782647e7d4a75b3f919d40529beb0401f86de6704d033866437684b405b5e33884adbf825d4022e3f3e9dce2f4d577f3d09ca7eef39fbfaf654fc8b3b3ce62b40284b0d686de83d58a1469d4eca4230884738e62baf1673f8f1dd4f72f4c1e03708c4255d999bc7625a0a1c9ccc64d66961ca93bc49e50d4429a947aade3716c8f4d3a20b306e0d4c4c81c682de48316550b2bc329f17a31ee216f9382914472f6e60ffeb95b274025305a749d592b1f009674977e0cecf8e0b0c818aaac25cc94c7b697eb7fa9fe88178f523ef70614f1e3d19a4ea2eab6126a68ae32cfa12e7117b77539acbc36625e4fb7dc0d6b48ae84e4a61ef5802ef540e970151a3b68bed173c8903d6b649564c9e3e23acc86047e429cb7bed2797b5045fc02362b577f3284e67234aa23c994029059090e26e48bbbe9a5d6411ad5cfba3b82f6163020f6351a7bcee495ff7ddf6627e33472963dc87329df69da0a8ade362c1978eca299f4d151e2e16fc8040d", 0x1000}, {&(0x7f00000014c0)="6354e20a9f613b6757fadb5ca2575156016a4a47e3a818ff5470c70a0a0ac599593997e3ea65808b724782352ed008d489c294f37f6fab06bb516c79b2e63bf85e898bca5f0f011e3857be5da0df8c4da3c12477799f5bb84be07fdaf0de4019249fb581e9ed59ae9a5e565faf9e2d0596a187581a04d891c1dff88552dfee7249ebc37649cdfb6f6e992f1359c6fe9f028821437f7f5f7649ff41eff1439cf004", 0xa1}, {&(0x7f0000000040)="2d846f9466c693bf3a37a9f3e5cec9ec25bd6bd76e48efaa89bbb8ed31240a90cbd93fc52833929f5b79dbed2b22da9ebea2e9663753b6cb570d2accab8d1ccc5153e9b0ec20719d0fc503ff68ac99de259c1b851ffa784bdd7921311b715a890942d48a4925e64c", 0x68}, {&(0x7f0000001580)="afdae702a28dfda15e4b4be3b83f962dc94ad106f235d747d8afb9c08fbebdd8274e5bbd47b970430361fd5cec091b752cdc0e352255396112464a6e4071e2335afccf15cd1f38a9bd955df75f266da6dab43addcdb23e3dab8c8d7a14559dc2b185b4edf0a19df43a825e2672c7dd82b11bebacb21c44f553c2b0006818d47032e53fd1d274022822b094c98a87f61f2abf021e95dbfe8b4b6e29af0a079cf0c1bc993d7e0018031893efdd2312782eb008d6b29a877460558e80b25859bc8b5a1ba23cc2050586fbfc8a91e25738", 0xcf}], 0x6, 0x800) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f00000000c0), 0x4000676, 0x0) 04:22:21 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x625d, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) [ 366.751452][T14542] minix_free_inode: bit 1 already cleared [ 366.775481][T14550] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 366.833946][ T6785] minix_free_inode: bit 1 already cleared 04:22:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:21 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xa0ffff, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 366.933226][ T6915] minix_free_inode: bit 1 already cleared 04:22:21 executing program 4: sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x6}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4001, 0x0, @ipv4={[], [], @remote}}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x69) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3ff, 0x7fffffff, {"2fab48572b5fccbf13d1cae40b7debc4"}, 0x8d0, 0x7, 0x355}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0xfffffffd, 0x3df, "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", 0xe8, 0xd, 0x2, 0x2, 0x1f}, r2}}, 0x128) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001e80)=@raw={'raw\x00', 0x3c1, 0x3, 0x1468, 0x1398, 0x1170, 0x1170, 0x0, 0x1170, 0x1398, 0x1398, 0x1398, 0x1398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x0, 0x0, 0x0, 0x4], [], @multicast2}, @remote, [], [], 'ip6tnl0\x00', 'veth0_to_hsr\x00', {}, {}, 0x88}, 0x0, 0x1128, 0x1170, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @local}, @mcast1, @rand_addr=' \x01\x00', @remote, @loopback, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x14c8) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0x3f9, 0x100, 0x70bd28, 0x25dfdbfc, {0x0, 0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000081}, 0x40) setpriority(0x2, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11f08) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) [ 367.039352][T14569] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 367.125248][T14570] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 367.139223][T14575] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:21 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0xf0, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 367.211006][T14570] minix_free_inode: bit 1 already cleared [ 367.299142][ T6785] minix_free_inode: bit 1 already cleared 04:22:21 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) 04:22:21 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc0ffff, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:21 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4, 0x3) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) 04:22:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:21 executing program 4: sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x6}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4001, 0x0, @ipv4={[], [], @remote}}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x69) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3ff, 0x7fffffff, {"2fab48572b5fccbf13d1cae40b7debc4"}, 0x8d0, 0x7, 0x355}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0xfffffffd, 0x3df, "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", 0xe8, 0xd, 0x2, 0x2, 0x1f}, r2}}, 0x128) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001e80)=@raw={'raw\x00', 0x3c1, 0x3, 0x1468, 0x1398, 0x1170, 0x1170, 0x0, 0x1170, 0x1398, 0x1398, 0x1398, 0x1398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x0, 0x0, 0x0, 0x4], [], @multicast2}, @remote, [], [], 'ip6tnl0\x00', 'veth0_to_hsr\x00', {}, {}, 0x88}, 0x0, 0x1128, 0x1170, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @local}, @mcast1, @rand_addr=' \x01\x00', @remote, @loopback, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x14c8) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0x3f9, 0x100, 0x70bd28, 0x25dfdbfc, {0x0, 0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000081}, 0x40) setpriority(0x2, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11f08) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) [ 367.412568][ T6915] minix_free_inode: bit 1 already cleared [ 367.566023][T14608] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 367.602721][T14611] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:21 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1ad, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 367.632679][T14608] attempt to access beyond end of device [ 367.641172][T14608] loop0: rw=2049, want=6434, limit=52 [ 367.656422][T14611] minix_free_inode: bit 1 already cleared [ 367.661454][T14608] Buffer I/O error on dev loop0, logical block 3216, lost async page write 04:22:21 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077513200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(r1, 0x3fc, 0x2) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) [ 367.686765][T14608] attempt to access beyond end of device [ 367.706644][T14608] loop0: rw=2049, want=6436, limit=52 [ 367.713163][T14608] Buffer I/O error on dev loop0, logical block 3217, lost async page write 04:22:21 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 367.753576][T14621] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 367.797952][ T6785] minix_free_inode: bit 1 already cleared 04:22:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:22 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 367.956028][ T6915] minix_free_inode: bit 1 already cleared 04:22:22 executing program 4: sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x6}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4001, 0x0, @ipv4={[], [], @remote}}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x69) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3ff, 0x7fffffff, {"2fab48572b5fccbf13d1cae40b7debc4"}, 0x8d0, 0x7, 0x355}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0xfffffffd, 0x3df, "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", 0xe8, 0xd, 0x2, 0x2, 0x1f}, r2}}, 0x128) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001e80)=@raw={'raw\x00', 0x3c1, 0x3, 0x1468, 0x1398, 0x1170, 0x1170, 0x0, 0x1170, 0x1398, 0x1398, 0x1398, 0x1398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x0, 0x0, 0x0, 0x4], [], @multicast2}, @remote, [], [], 'ip6tnl0\x00', 'veth0_to_hsr\x00', {}, {}, 0x88}, 0x0, 0x1128, 0x1170, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @local}, @mcast1, @rand_addr=' \x01\x00', @remote, @loopback, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x14c8) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0x3f9, 0x100, 0x70bd28, 0x25dfdbfc, {0x0, 0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000081}, 0x40) setpriority(0x2, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11f08) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) [ 368.110976][T14646] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 368.129645][T14650] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 368.138034][T14653] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:22 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1b6, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 368.159953][T14650] minix_free_inode: bit 1 already cleared 04:22:22 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 368.247452][ T6785] minix_free_inode: bit 1 already cleared 04:22:22 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 368.370858][ T6915] minix_free_inode: bit 1 already cleared [ 368.393444][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 368.393456][ T28] audit: type=1800 audit(1592194942.559:779): pid=14666 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16364 res=0 04:22:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 368.495469][ T28] audit: type=1800 audit(1592194942.659:780): pid=14674 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16379 res=0 [ 368.543026][ T28] audit: type=1800 audit(1592194942.709:781): pid=14666 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16364 res=0 [ 368.571902][T14674] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 368.603675][T14682] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 368.613599][T14674] attempt to access beyond end of device [ 368.619646][T14674] loop0: rw=2049, want=6434, limit=52 [ 368.625288][T14674] Buffer I/O error on dev loop0, logical block 3216, lost async page write [ 368.634321][ T28] audit: type=1800 audit(1592194942.799:782): pid=14684 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16363 res=0 [ 368.644240][T14682] minix_free_inode: bit 1 already cleared [ 368.654467][T14674] attempt to access beyond end of device [ 368.667927][T14674] loop0: rw=2049, want=6436, limit=52 [ 368.673901][T14674] Buffer I/O error on dev loop0, logical block 3217, lost async page write [ 368.720351][ T6785] minix_free_inode: bit 1 already cleared 04:22:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 368.765481][T14684] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:23 executing program 0 (fault-call:7 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:23 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:23 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1f1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:23 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 368.938953][ T6915] minix_free_inode: bit 1 already cleared [ 368.980518][ T28] audit: type=1800 audit(1592194943.149:783): pid=14697 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16384 res=0 [ 369.081836][ T28] audit: type=1800 audit(1592194943.249:784): pid=14702 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16363 res=0 [ 369.082928][T14697] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 369.122014][T14707] FAULT_INJECTION: forcing a failure. [ 369.122014][T14707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 369.218859][T14707] CPU: 0 PID: 14707 Comm: syz-executor.0 Not tainted 5.7.0-syzkaller #0 [ 369.227219][T14707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.237274][T14707] Call Trace: [ 369.240570][T14707] dump_stack+0x188/0x20d [ 369.244911][T14707] should_fail.cold+0x5/0xa [ 369.249424][T14707] ? fault_create_debugfs_attr+0x140/0x140 [ 369.255240][T14707] __alloc_pages_nodemask+0x17a/0x810 [ 369.257792][ T28] audit: type=1800 audit(1592194943.419:785): pid=14714 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16372 res=0 [ 369.260636][T14707] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 369.260652][T14707] ? xas_load+0x66/0x140 [ 369.260671][T14707] ? find_get_entry+0x426/0x730 [ 369.260687][T14707] ? __lock_page_or_retry+0x5c0/0x5c0 [ 369.260708][T14707] alloc_pages_current+0xff/0x200 [ 369.260723][T14707] __page_cache_alloc+0x298/0x480 [ 369.260741][T14707] pagecache_get_page+0x27f/0xa10 [ 369.260757][T14707] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 369.260775][T14707] grab_cache_page_write_begin+0x6d/0xa0 [ 369.326877][T14707] ext4_da_write_begin+0x314/0xbc0 [ 369.332061][T14707] ? do_raw_spin_unlock+0x171/0x260 [ 369.337268][T14707] ? ext4_write_begin+0xda0/0xda0 [ 369.342295][T14707] ? memcpy_mcsafe_to_page+0x140/0x140 [ 369.347774][T14707] generic_perform_write+0x20a/0x4e0 [ 369.353070][T14707] ? update_time+0xc0/0xc0 [ 369.357485][T14707] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 369.365550][T14707] ? down_write+0xdb/0x150 [ 369.369976][T14707] ext4_buffered_write_iter+0x1f7/0x450 [ 369.375525][T14707] ext4_file_write_iter+0x1ec/0x13f0 [ 369.380937][T14707] ? sock_addr_convert_ctx_access+0x27a/0x3420 [ 369.387093][T14707] ? ext4_buffered_write_iter+0x450/0x450 [ 369.392811][T14707] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 369.398786][T14707] ? find_held_lock+0x2d/0x110 [ 369.403556][T14707] new_sync_write+0x426/0x650 [ 369.408228][T14707] ? new_sync_read+0x6d0/0x6d0 [ 369.412998][T14707] ? debug_smp_processor_id+0x2f/0x185 [ 369.418458][T14707] ? rcu_read_lock_any_held+0xcd/0xf0 [ 369.423825][T14707] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 369.429116][T14707] __vfs_write+0xc9/0x100 [ 369.433446][T14707] vfs_write+0x268/0x5d0 [ 369.437688][T14707] ksys_write+0x12d/0x250 [ 369.442014][T14707] ? __ia32_sys_read+0xb0/0xb0 [ 369.446771][T14707] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 369.452747][T14707] ? do_syscall_64+0x21/0x7d0 [ 369.457423][T14707] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 369.463409][T14707] do_syscall_64+0xf6/0x7d0 [ 369.467916][T14707] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 369.473801][T14707] RIP: 0033:0x45ca69 [ 369.477695][T14707] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.497293][T14707] RSP: 002b:00007fdf5154ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.505709][T14707] RAX: ffffffffffffffda RBX: 000000000050d440 RCX: 000000000045ca69 04:22:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 369.513673][T14707] RDX: 00000000000004c4 RSI: 0000000020000980 RDI: 0000000000000009 [ 369.521636][T14707] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 369.529602][T14707] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 369.537564][T14707] R13: 0000000000000d09 R14: 00000000004cf610 R15: 00007fdf5154f6d4 [ 369.584393][ T28] audit: type=1800 audit(1592194943.749:786): pid=14702 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16363 res=0 [ 369.637894][T14714] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:23 executing program 0 (fault-call:7 fault-nth:1): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 369.716188][ T6785] minix_free_inode: bit 1 already cleared [ 369.881077][ T6915] minix_free_inode: bit 1 already cleared [ 369.903402][T14723] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 369.917418][ T28] audit: type=1800 audit(1592194944.089:787): pid=14728 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16363 res=0 [ 369.956347][T14723] minix_free_inode: bit 1 already cleared 04:22:24 executing program 4: sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x6}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4001, 0x0, @ipv4={[], [], @remote}}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x69) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3ff, 0x7fffffff, {"2fab48572b5fccbf13d1cae40b7debc4"}, 0x8d0, 0x7, 0x355}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0xfffffffd, 0x3df, "16c84a425590f63a0e7500a68ab8acea89ec384ecdd6e3a2280cb9fd6fdbca0af17136e881985d07251420e066b6e06aae9ee5f1de55d1c7beaa33043704a8af3d39ae6f4ade00d9142c2c8ac70088d39ea319b9bc6bf3fed9f378a87c5cda8dbbdc2863ea853d647943916af2ce9e262b4f6f148a42dee059dfa7875bdec733b91ab90ecc646016d1fea157625b8fe9d625870b9ebdb5951a06df985fcb8e0c84dfb235e761167d022f851470e7cb3e6dbc89589cba01727acfb1617db8f634c4a9f5f9a0030f5c82341ef412f28534b59a5b40fb3d4d6d7580935e1aace366901d92dd938a835855ffdcea18aff4748371f7d8aab48b2acb75792fb0108912", 0xe8, 0xd, 0x2, 0x2, 0x1f}, r2}}, 0x128) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001e80)=@raw={'raw\x00', 0x3c1, 0x3, 0x1468, 0x1398, 0x1170, 0x1170, 0x0, 0x1170, 0x1398, 0x1398, 0x1398, 0x1398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x0, 0x0, 0x0, 0x4], [], @multicast2}, @remote, [], [], 'ip6tnl0\x00', 'veth0_to_hsr\x00', {}, {}, 0x88}, 0x0, 0x1128, 0x1170, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @local}, @mcast1, @rand_addr=' \x01\x00', @remote, @loopback, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x14c8) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0x3f9, 0x100, 0x70bd28, 0x25dfdbfc, {0x0, 0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000081}, 0x40) setpriority(0x2, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11f08) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) 04:22:24 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x207, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:24 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r1, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES64, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6420000008000500000000000c00990003000000000000000800050002000000010000806a673200000000000000000000000000080001000200000008000300726925a28c823ee60aa23548eb121f8b014d432866b19ebc286833b0504d14eb8740ee71a488e89f7a30d997438e456157c15d42388f856a147f6d39", @ANYRES32=0x0, @ANYRESHEX=r0], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) [ 370.062611][T14731] FAULT_INJECTION: forcing a failure. [ 370.062611][T14731] name failslab, interval 1, probability 0, space 0, times 0 [ 370.067995][ T28] audit: type=1800 audit(1592194944.229:788): pid=14734 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16375 res=0 [ 370.101247][T14731] CPU: 0 PID: 14731 Comm: syz-executor.0 Not tainted 5.7.0-syzkaller #0 [ 370.109594][T14731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.119644][T14731] Call Trace: [ 370.122941][T14731] dump_stack+0x188/0x20d [ 370.127284][T14731] should_fail.cold+0x5/0xa [ 370.131801][T14731] ? fault_create_debugfs_attr+0x140/0x140 [ 370.137606][T14731] should_failslab+0x5/0xf [ 370.142012][T14731] __kmalloc+0x2d9/0x7a0 [ 370.146249][T14731] ? ext4_find_extent+0x7d2/0xa50 [ 370.151269][T14731] ? debug_smp_processor_id+0x2f/0x185 [ 370.156734][T14731] ext4_find_extent+0x7d2/0xa50 [ 370.161608][T14731] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 370.167590][T14731] ? generic_perform_write+0x20a/0x4e0 [ 370.173050][T14731] ext4_ext_map_blocks+0x1af/0x3710 [ 370.178242][T14731] ? lock_release+0x800/0x800 [ 370.182923][T14731] ? ext4_es_lookup_extent+0x3b1/0xd30 [ 370.188370][T14731] ? ext4_ext_release+0x10/0x10 [ 370.193219][T14731] ? debug_smp_processor_id+0x2f/0x185 [ 370.198689][T14731] ? down_read+0x110/0x420 [ 370.203164][T14731] ? down_read_killable+0x460/0x460 [ 370.208350][T14731] ? ext4_es_lookup_extent+0x41d/0xd30 [ 370.213796][T14731] ? lock_acquire+0x1f2/0x8f0 [ 370.218466][T14731] ext4_da_get_block_prep+0xa28/0x1120 [ 370.223909][T14731] ? find_held_lock+0x2d/0x110 [ 370.228664][T14731] ? other_inode_match+0xab0/0xab0 [ 370.233778][T14731] ? ext4_block_write_begin+0x10ab/0x1430 [ 370.239627][T14731] ? lock_downgrade+0x840/0x840 [ 370.244491][T14731] ? create_empty_buffers+0x5b8/0x8c0 [ 370.249871][T14731] ext4_block_write_begin+0x59a/0x1430 [ 370.255324][T14731] ? other_inode_match+0xab0/0xab0 [ 370.260546][T14731] ? ext4_dax_writepages+0xba0/0xba0 [ 370.265918][T14731] ext4_da_write_begin+0x56e/0xbc0 [ 370.271031][T14731] ? ext4_write_begin+0xda0/0xda0 [ 370.276140][T14731] ? memcpy_mcsafe_to_page+0x140/0x140 [ 370.281697][T14731] generic_perform_write+0x20a/0x4e0 [ 370.287078][T14731] ? update_time+0xc0/0xc0 [ 370.291485][T14731] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 370.299547][T14731] ? down_write+0xdb/0x150 [ 370.303976][T14731] ext4_buffered_write_iter+0x1f7/0x450 [ 370.309519][T14731] ext4_file_write_iter+0x1ec/0x13f0 [ 370.314802][T14731] ? sock_addr_convert_ctx_access+0x27a/0x3420 [ 370.320947][T14731] ? ext4_buffered_write_iter+0x450/0x450 [ 370.326665][T14731] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 370.332644][T14731] ? find_held_lock+0x2d/0x110 [ 370.337398][T14731] new_sync_write+0x426/0x650 [ 370.342054][T14731] ? new_sync_read+0x6d0/0x6d0 [ 370.346817][T14731] ? debug_smp_processor_id+0x2f/0x185 [ 370.352280][T14731] ? rcu_read_lock_any_held+0xcd/0xf0 [ 370.357653][T14731] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 370.362977][T14731] __vfs_write+0xc9/0x100 [ 370.367296][T14731] vfs_write+0x268/0x5d0 [ 370.371532][T14731] ksys_write+0x12d/0x250 [ 370.375858][T14731] ? __ia32_sys_read+0xb0/0xb0 [ 370.380623][T14731] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 370.386600][T14731] ? do_syscall_64+0x21/0x7d0 [ 370.391269][T14731] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 370.397296][T14731] do_syscall_64+0xf6/0x7d0 [ 370.401780][T14731] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 370.407647][T14731] RIP: 0033:0x45ca69 [ 370.411531][T14731] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.431125][T14731] RSP: 002b:00007fdf5154ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 370.439531][T14731] RAX: ffffffffffffffda RBX: 000000000050d440 RCX: 000000000045ca69 [ 370.447496][T14731] RDX: 00000000000004c4 RSI: 0000000020000980 RDI: 0000000000000009 [ 370.455457][T14731] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 370.463410][T14731] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 370.471365][T14731] R13: 0000000000000d09 R14: 00000000004cf610 R15: 00007fdf5154f6d4 04:22:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 370.551668][T14728] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 370.578928][T14738] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:24 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:24 executing program 0 (fault-call:7 fault-nth:2): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 370.763539][ T6915] minix_free_inode: bit 1 already cleared [ 370.793424][ T6785] minix_free_inode: bit 1 already cleared 04:22:25 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x269, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 370.895661][T14756] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 370.925052][T14756] minix_free_inode: bit 1 already cleared [ 371.173150][T14766] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 371.215754][T14764] FAULT_INJECTION: forcing a failure. [ 371.215754][T14764] name failslab, interval 1, probability 0, space 0, times 0 [ 371.229087][T14764] CPU: 1 PID: 14764 Comm: syz-executor.0 Not tainted 5.7.0-syzkaller #0 [ 371.237411][T14764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.247465][T14764] Call Trace: [ 371.250769][T14764] dump_stack+0x188/0x20d [ 371.255111][T14764] should_fail.cold+0x5/0xa [ 371.259624][T14764] ? fault_create_debugfs_attr+0x140/0x140 [ 371.265432][T14764] ? ext4_es_scan+0x760/0x760 [ 371.268650][T14767] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 371.270106][T14764] ? lock_acquire+0x1f2/0x8f0 [ 371.270168][T14764] should_failslab+0x5/0xf [ 371.270181][T14764] kmem_cache_alloc+0x44/0x740 [ 371.270199][T14764] ? lock_release+0x800/0x800 [ 371.296968][T14764] ? debug_smp_processor_id+0x2f/0x185 [ 371.302433][T14764] __es_insert_extent+0x2ae/0xf20 [ 371.307463][T14764] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 371.313453][T14764] ext4_es_insert_extent+0x2a8/0xa10 [ 371.318743][T14764] ? ext4_es_scan_clu+0xe0/0xe0 [ 371.323598][T14764] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 371.329154][T14764] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 371.335139][T14764] ? do_raw_read_unlock+0x3b/0x70 [ 371.340165][T14764] ? ext4_es_find_extent_range+0x454/0x650 [ 371.345977][T14764] ext4_ext_put_gap_in_cache+0xee/0x140 [ 371.351528][T14764] ? ext4_rereserve_cluster+0x230/0x230 [ 371.357083][T14764] ? ext4_find_extent+0x6bb/0xa50 04:22:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000000840)={@void, @val={0x0, 0x0, 0x3, 0x2}, @ipx={0xffff, 0x101e, 0xff, 0x11, {@random=0x57, @random="2f2d77b19b30", 0x1f}, {@random=0x9, @broadcast, 0xe000}, "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"}}, 0x1028) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0xd001, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}, @IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x40}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002080)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002480)={&(0x7f0000002400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01000000000000000000070001000c00990005000000020000000800010002000000"], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x5c, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x40080) sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4100000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x78, r6, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY_COVERAGE_CLASS={0x5, 0x59, 0x7}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x6}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x54, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_TXOP={0x6, 0x2, 0x6}, @NL80211_TXQ_ATTR_AIFS={0x5, 0x5, 0xff}, @NL80211_TXQ_ATTR_QUEUE={0x5, 0x1, 0xaf}, @NL80211_TXQ_ATTR_AIFS={0x5, 0x5, 0x81}, @NL80211_TXQ_ATTR_TXOP={0x6}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x7}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x6}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x70}, @NL80211_TXQ_ATTR_QUEUE={0x5, 0x1, 0x80}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x81}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x400c080}, 0x20004010) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000040)=0x80) [ 371.362110][T14764] ? generic_perform_write+0x20a/0x4e0 [ 371.367578][T14764] ext4_ext_map_blocks+0x18ff/0x3710 [ 371.372871][T14764] ? lock_release+0x800/0x800 [ 371.377547][T14764] ? ext4_es_lookup_extent+0x3b1/0xd30 [ 371.383009][T14764] ? ext4_ext_release+0x10/0x10 [ 371.387861][T14764] ? debug_smp_processor_id+0x2f/0x185 [ 371.393330][T14764] ? down_read+0x110/0x420 [ 371.397754][T14764] ? down_read_killable+0x460/0x460 [ 371.402953][T14764] ? ext4_es_lookup_extent+0x41d/0xd30 [ 371.408412][T14764] ? lock_acquire+0x1f2/0x8f0 [ 371.413096][T14764] ext4_da_get_block_prep+0xa28/0x1120 [ 371.418556][T14764] ? find_held_lock+0x2d/0x110 [ 371.423322][T14764] ? other_inode_match+0xab0/0xab0 [ 371.428426][T14764] ? ext4_block_write_begin+0x10ab/0x1430 [ 371.434148][T14764] ? lock_downgrade+0x840/0x840 [ 371.439007][T14764] ? create_empty_buffers+0x5b8/0x8c0 [ 371.444395][T14764] ext4_block_write_begin+0x59a/0x1430 [ 371.449863][T14764] ? other_inode_match+0xab0/0xab0 [ 371.454982][T14764] ? ext4_dax_writepages+0xba0/0xba0 [ 371.460283][T14764] ext4_da_write_begin+0x56e/0xbc0 [ 371.465407][T14764] ? ext4_write_begin+0xda0/0xda0 [ 371.470433][T14764] ? memcpy_mcsafe_to_page+0x140/0x140 [ 371.475904][T14764] generic_perform_write+0x20a/0x4e0 [ 371.481201][T14764] ? update_time+0xc0/0xc0 [ 371.485623][T14764] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 371.493689][T14764] ? down_write+0xdb/0x150 [ 371.498123][T14764] ext4_buffered_write_iter+0x1f7/0x450 [ 371.503677][T14764] ext4_file_write_iter+0x1ec/0x13f0 [ 371.508979][T14764] ? sock_addr_convert_ctx_access+0x27a/0x3420 [ 371.515138][T14764] ? ext4_buffered_write_iter+0x450/0x450 [ 371.520866][T14764] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 371.526844][T14764] ? find_held_lock+0x2d/0x110 [ 371.531615][T14764] new_sync_write+0x426/0x650 [ 371.536293][T14764] ? new_sync_read+0x6d0/0x6d0 [ 371.541070][T14764] ? debug_smp_processor_id+0x2f/0x185 [ 371.546541][T14764] ? rcu_read_lock_any_held+0xcd/0xf0 [ 371.551918][T14764] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 371.557211][T14764] __vfs_write+0xc9/0x100 [ 371.561546][T14764] vfs_write+0x268/0x5d0 04:22:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 371.565796][T14764] ksys_write+0x12d/0x250 [ 371.570134][T14764] ? __ia32_sys_read+0xb0/0xb0 [ 371.574897][T14764] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 371.580881][T14764] ? do_syscall_64+0x21/0x7d0 [ 371.585562][T14764] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 371.591549][T14764] do_syscall_64+0xf6/0x7d0 [ 371.596083][T14764] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 371.601972][T14764] RIP: 0033:0x45ca69 [ 371.605864][T14764] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.625465][T14764] RSP: 002b:00007fdf5156fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.633880][T14764] RAX: ffffffffffffffda RBX: 000000000050d440 RCX: 000000000045ca69 [ 371.641852][T14764] RDX: 00000000000004c4 RSI: 0000000020000980 RDI: 0000000000000009 [ 371.649827][T14764] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 371.657804][T14764] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 371.665959][T14764] R13: 0000000000000d09 R14: 00000000004cf610 R15: 00007fdf515706d4 04:22:26 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:26 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002cbd7000ffdbdf25070000001400060076657468305f746f5f626f6e64000000080005000000000500000000030000000000000008000500020000000100228077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:26 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x381, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 371.935652][T14802] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 371.941298][T14796] IPVS: ftp: loaded support on port[0] = 21 [ 371.959158][ T6915] minix_free_inode: bit 1 already cleared [ 371.964905][T14802] minix_free_inode: bit 1 already cleared [ 372.191099][T14813] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xff000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 04:22:26 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x382, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:26 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 372.336775][ T6915] minix_free_inode: bit 1 already cleared [ 372.540197][T14829] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 372.551110][T14828] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:22:26 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x4c4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 372.634493][T14796] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 372.644365][T14829] minix_free_inode: bit 1 already cleared [ 372.663045][ T6785] minix_free_inode: bit 1 already cleared 04:22:26 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 372.828737][ T6915] minix_free_inode: bit 1 already cleared 04:22:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 373.092854][T14875] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 373.105598][T14874] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 373.143250][T14875] minix_free_inode: bit 1 already cleared [ 373.248501][ T6915] minix_free_inode: bit 1 already cleared [ 373.260084][T14796] IPVS: ftp: loaded support on port[0] = 21 [ 373.481062][T14799] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.038311][ T271] tipc: TX() has been purged, node left! 04:22:28 executing program 4: openat$mice(0xffffff9c, 0x0, 0x1) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffff98, 0x77, 0x2}, 0xb) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) socket$inet6(0xa, 0x803, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x100) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x6, 0x14201) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0x301}, 0x14}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x48, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xffffff01, 0x100, 0x400, 0x9, 0x6]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x2, 0x7d]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}]}, 0x48}}, 0x844) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x5427, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000140)='(\xe0\xf5\x00', &(0x7f0000000280)='\x00', &(0x7f0000000440)='\x00', &(0x7f0000000500)='\x83m1/', &(0x7f0000000540)='\xdcj_\xdb\xd7\x86,\xb2$,\xa2\xfc^qGM\x1e\xb6\xca5C\xd04X\x8eP\xa9\xa5~8\xfd-f\xa3n\xf2\xba~6\xf3\xb1\x82\xb6d\xe6\x12WRo\x9f\x18\xb4\xf2\x100r\xca\x92;SD\xcc\xab']) 04:22:28 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x3f7, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:28 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:28 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x800, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x1a, 0x80a5, &(0x7f0000e68000)={0x2, 0x4e27, @loopback}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) 04:22:28 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xfffbffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 374.270484][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 374.270495][ T28] audit: type=1800 audit(1592194948.439:803): pid=14927 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16369 res=0 [ 374.358919][ T28] audit: type=1800 audit(1592194948.469:804): pid=14926 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16373 res=0 [ 374.361567][T14926] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 374.386369][ T28] audit: type=1800 audit(1592194948.509:805): pid=14933 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16370 res=0 [ 374.437341][ T28] audit: type=1800 audit(1592194948.599:806): pid=14927 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16369 res=0 [ 374.464793][T14933] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 374.479509][T14928] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 374.535693][T14928] minix_free_inode: bit 1 already cleared [ 374.567957][T14930] ================================================================== [ 374.576473][T14930] BUG: KASAN: null-ptr-deref in get_block+0x635/0x1380 [ 374.583329][T14930] Write of size 8 at addr 0000000000000000 by task syz-executor.0/14930 [ 374.591639][T14930] [ 374.593973][T14930] CPU: 1 PID: 14930 Comm: syz-executor.0 Not tainted 5.7.0-syzkaller #0 [ 374.602291][T14930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.612343][T14930] Call Trace: [ 374.615646][T14930] dump_stack+0x188/0x20d [ 374.619985][T14930] ? get_block+0x635/0x1380 [ 374.624477][T14930] ? get_block+0x635/0x1380 [ 374.628968][T14930] kasan_report.cold+0x5/0x37 [ 374.633626][T14930] ? get_block+0x635/0x1380 [ 374.638111][T14930] check_memory_region+0x141/0x190 [ 374.643212][T14930] get_block+0x635/0x1380 [ 374.647560][T14930] ? block_to_path.isra.0+0x300/0x300 [ 374.652934][T14930] ? touch_buffer+0x330/0x330 [ 374.657630][T14930] ? create_empty_buffers+0x5b8/0x8c0 [ 374.663005][T14930] ? do_raw_spin_unlock+0x171/0x260 [ 374.668206][T14930] minix_get_block+0xe5/0x110 [ 374.672887][T14930] __block_write_begin_int+0x490/0x1b20 [ 374.678431][T14930] ? minix_rename+0x8c0/0x8c0 [ 374.683121][T14930] ? remove_inode_buffers+0x1c0/0x1c0 [ 374.688493][T14930] ? pagecache_get_page+0x204/0xa10 [ 374.693697][T14930] ? balance_dirty_pages_ratelimited+0x160/0x1d50 [ 374.700107][T14930] ? wait_for_stable_page+0x11c/0x1e0 [ 374.705481][T14930] ? minix_rename+0x8c0/0x8c0 [ 374.710182][T14930] block_write_begin+0x58/0x2e0 [ 374.715039][T14930] minix_write_begin+0x35/0xe0 [ 374.719807][T14930] generic_perform_write+0x20a/0x4e0 [ 374.725102][T14930] ? __mnt_drop_write+0x50/0x80 [ 374.729983][T14930] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 374.738054][T14930] ? update_time+0xc0/0xc0 [ 374.742567][T14930] ? down_write+0xdb/0x150 [ 374.746991][T14930] __generic_file_write_iter+0x24c/0x610 [ 374.752636][T14930] generic_file_write_iter+0x3f3/0x630 [ 374.758105][T14930] ? __generic_file_write_iter+0x610/0x610 [ 374.763914][T14930] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 374.769898][T14930] ? find_held_lock+0x2d/0x110 [ 374.774670][T14930] new_sync_write+0x426/0x650 [ 374.779356][T14930] ? new_sync_read+0x6d0/0x6d0 [ 374.784132][T14930] ? debug_smp_processor_id+0x2f/0x185 [ 374.789597][T14930] ? rcu_read_lock_any_held+0xcd/0xf0 [ 374.794974][T14930] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 374.800265][T14930] __vfs_write+0xc9/0x100 [ 374.804599][T14930] vfs_write+0x268/0x5d0 [ 374.808843][T14930] ksys_write+0x12d/0x250 [ 374.813177][T14930] ? __ia32_sys_read+0xb0/0xb0 [ 374.817943][T14930] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 374.823926][T14930] ? do_syscall_64+0x21/0x7d0 [ 374.828601][T14930] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 374.834585][T14930] do_syscall_64+0xf6/0x7d0 [ 374.839096][T14930] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 374.844991][T14930] RIP: 0033:0x45ca69 [ 374.848899][T14930] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 374.868503][T14930] RSP: 002b:00007fdf5154ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 374.876919][T14930] RAX: ffffffffffffffda RBX: 000000000050d440 RCX: 000000000045ca69 04:22:29 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x44042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'lc\x00', 0x0, 0x6}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x3f8, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 04:22:29 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r0, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25070000001400040076657468305f746f5f626f6e6400000008000500000000000c009900030000000000000008000500020000000100008077673200000000000000000000000000080001000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007ed, &(0x7f0000e68000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r3 = socket(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0xddf5) [ 374.884890][T14930] RDX: 000000000000fdef RSI: 0000000020000980 RDI: 0000000000000006 [ 374.892862][T14930] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 374.900833][T14930] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 374.908804][T14930] R13: 0000000000000d09 R14: 00000000004cf610 R15: 00007fdf5154f6d4 [ 374.916790][T14930] ================================================================== [ 374.924853][T14930] Disabling lock debugging due to kernel taint 04:22:29 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x8000, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r2 = open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xe97}) write$binfmt_elf64(r2, 0x0, 0x4c4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 374.979980][ T6915] minix_free_inode: bit 1 already cleared 04:22:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = memfd_create(&(0x7f00000002c0)='.\xa93\x04\x98,4#n\x05^\xc5i\xdd\r\x02q\xae\xf6\x88\xa7\xfb\x16\x1e\x992\xc4\x1e\xb3\b\x1b\xc0\\\xb9\f\xf8\vq\xaf\xa0\xc6\x1d\xd5\xe1A_-\xb6\x85\xee\x8d\x92\x10N\xa8A\xcf*@\xbe\x9fP\xce\xe6\x9d;\xbe1\xb9\x93\xf7\xa8\xbe!v\xe8\x94P\xc3#q3hE8\xb5F\xe4B\xfc\x14\xcdpE\xf4\x06_~8v\xa1Q\xca3\xd0\x9ep2F6RNG\xf0\aT\xb9.7\xa3\x92\x85\x8eT*\xd8\xd9\xe1P\xb4\xf8\xda\xb4{\xce\x9d\xb4^\xca:i\x18\b\x9c\v\xbf\xd1\x8f\x1dL\xbe', 0x0) lseek(r1, 0x0, 0x1) memfd_create(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x6) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES64, @ANYRES16=0x0, @ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="0c003e9a32842c2490a0ffff"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0xddf5) [ 375.022563][T14930] Kernel panic - not syncing: panic_on_warn set ... [ 375.029188][T14930] CPU: 1 PID: 14930 Comm: syz-executor.0 Tainted: G B 5.7.0-syzkaller #0 [ 375.038899][T14930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.048945][T14930] Call Trace: [ 375.052234][T14930] dump_stack+0x188/0x20d [ 375.056578][T14930] ? get_block+0x570/0x1380 [ 375.061287][T14930] panic+0x2e3/0x75c [ 375.065182][T14930] ? add_taint.cold+0x16/0x16 04:22:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 375.069860][T14930] ? preempt_schedule_common+0x5e/0xc0 [ 375.075314][T14930] ? get_block+0x635/0x1380 [ 375.079814][T14930] ? get_block+0x635/0x1380 [ 375.084313][T14930] ? preempt_schedule_thunk+0x16/0x18 [ 375.089711][T14930] ? trace_hardirqs_on+0x55/0x230 [ 375.094838][T14930] ? get_block+0x635/0x1380 [ 375.099336][T14930] ? get_block+0x635/0x1380 [ 375.103838][T14930] end_report+0x4d/0x53 [ 375.107989][T14930] kasan_report.cold+0xd/0x37 [ 375.112657][T14930] ? get_block+0x635/0x1380 [ 375.117157][T14930] check_memory_region+0x141/0x190 [ 375.122271][T14930] get_block+0x635/0x1380 [ 375.126582][T14930] ? block_to_path.isra.0+0x300/0x300 [ 375.131930][T14930] ? touch_buffer+0x330/0x330 [ 375.136598][T14930] ? create_empty_buffers+0x5b8/0x8c0 [ 375.141945][T14930] ? do_raw_spin_unlock+0x171/0x260 [ 375.147116][T14930] minix_get_block+0xe5/0x110 [ 375.151770][T14930] __block_write_begin_int+0x490/0x1b20 [ 375.157290][T14930] ? minix_rename+0x8c0/0x8c0 [ 375.161944][T14930] ? remove_inode_buffers+0x1c0/0x1c0 [ 375.167299][T14930] ? pagecache_get_page+0x204/0xa10 [ 375.172475][T14930] ? balance_dirty_pages_ratelimited+0x160/0x1d50 [ 375.178865][T14930] ? wait_for_stable_page+0x11c/0x1e0 [ 375.184211][T14930] ? minix_rename+0x8c0/0x8c0 [ 375.188860][T14930] block_write_begin+0x58/0x2e0 [ 375.193686][T14930] minix_write_begin+0x35/0xe0 [ 375.198423][T14930] generic_perform_write+0x20a/0x4e0 [ 375.203700][T14930] ? __mnt_drop_write+0x50/0x80 [ 375.208527][T14930] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 375.216563][T14930] ? update_time+0xc0/0xc0 [ 375.220956][T14930] ? down_write+0xdb/0x150 [ 375.225348][T14930] __generic_file_write_iter+0x24c/0x610 [ 375.230954][T14930] generic_file_write_iter+0x3f3/0x630 [ 375.236388][T14930] ? __generic_file_write_iter+0x610/0x610 [ 375.242168][T14930] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 375.248123][T14930] ? find_held_lock+0x2d/0x110 [ 375.252860][T14930] new_sync_write+0x426/0x650 [ 375.257511][T14930] ? new_sync_read+0x6d0/0x6d0 [ 375.262259][T14930] ? debug_smp_processor_id+0x2f/0x185 [ 375.267692][T14930] ? rcu_read_lock_any_held+0xcd/0xf0 [ 375.273039][T14930] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 375.278299][T14930] __vfs_write+0xc9/0x100 [ 375.282603][T14930] vfs_write+0x268/0x5d0 [ 375.286820][T14930] ksys_write+0x12d/0x250 [ 375.291131][T14930] ? __ia32_sys_read+0xb0/0xb0 [ 375.295868][T14930] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 375.301823][T14930] ? do_syscall_64+0x21/0x7d0 [ 375.306484][T14930] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 375.312453][T14930] do_syscall_64+0xf6/0x7d0 [ 375.316943][T14930] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 375.322817][T14930] RIP: 0033:0x45ca69 [ 375.326693][T14930] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.346288][T14930] RSP: 002b:00007fdf5154ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 375.354684][T14930] RAX: ffffffffffffffda RBX: 000000000050d440 RCX: 000000000045ca69 [ 375.362636][T14930] RDX: 000000000000fdef RSI: 0000000020000980 RDI: 0000000000000006 [ 375.370585][T14930] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 375.378534][T14930] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 375.386484][T14930] R13: 0000000000000d09 R14: 00000000004cf610 R15: 00007fdf5154f6d4 [ 375.395860][T14930] Kernel Offset: disabled [ 375.400177][T14930] Rebooting in 86400 seconds..